Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
202s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 00:29 UTC
Static task
static1
Behavioral task
behavioral1
Sample
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
Resource
win10v2004-20221111-en
General
-
Target
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe
-
Size
60KB
-
MD5
360d89d5aa19c242f346d939962cb590
-
SHA1
b5cd4284f8edbd39c88b7e587181cab6a0924261
-
SHA256
751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c
-
SHA512
f7ad21fa811aa1471e17b6b90040556983b729373796e5a3879580e3facc074a23ed05f06ba1badd7e8e7c2f9cb346a7c415ca9d9095fb07849faef977a09e74
-
SSDEEP
768:k6qTD9xRIHgWTU6xUdPMXndo7sZUNMRrY20KtF1eNbw1o+pdok4I:h2DL6mJdsndo6UNMyetF1qw1o+pdSI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gaove.exe -
Executes dropped EXE 1 IoCs
pid Process 532 gaove.exe -
Loads dropped DLL 2 IoCs
pid Process 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /V" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /w" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /b" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /h" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /u" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /A" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /Z" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /z" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /c" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /J" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /T" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /x" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /d" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /n" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /v" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /I" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /N" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /s" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /t" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /f" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /Y" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /W" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /m" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /e" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /G" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /g" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /l" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /p" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /L" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /a" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /D" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /S" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /K" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /y" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /P" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /C" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /H" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /o" gaove.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /U" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /k" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /j" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /r" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /R" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /Q" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /O" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /F" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /M" gaove.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\gaove = "C:\\Users\\Admin\\gaove.exe /q" gaove.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe 532 gaove.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 532 gaove.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 332 wrote to memory of 532 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 28 PID 332 wrote to memory of 532 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 28 PID 332 wrote to memory of 532 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 28 PID 332 wrote to memory of 532 332 751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe 28 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21 PID 532 wrote to memory of 332 532 gaove.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe"C:\Users\Admin\AppData\Local\Temp\751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\gaove.exe"C:\Users\Admin\gaove.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532
-
Network
-
Remote address:8.8.8.8:53Requestns1.player1253.comIN AResponsens1.player1253.comIN A204.11.56.48
-
204.11.56.48:8000ns1.player1253.com751609f7e6b651aba656ec190f5ebd00bcf5f23179ae3124c26d9460f4c0574c.exe152 B 3
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD508b3e72703cc5b8ecdc06580191805de
SHA1b7c51aeefb5e23786374795cd8314dfd69f93204
SHA256b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208
SHA5126cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c
-
Filesize
60KB
MD508b3e72703cc5b8ecdc06580191805de
SHA1b7c51aeefb5e23786374795cd8314dfd69f93204
SHA256b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208
SHA5126cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c
-
Filesize
60KB
MD508b3e72703cc5b8ecdc06580191805de
SHA1b7c51aeefb5e23786374795cd8314dfd69f93204
SHA256b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208
SHA5126cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c
-
Filesize
60KB
MD508b3e72703cc5b8ecdc06580191805de
SHA1b7c51aeefb5e23786374795cd8314dfd69f93204
SHA256b68b3a912c42d192e176e021817a60e119650ce133383886a063d14cf3cc9208
SHA5126cdfc0bff15c6ec4a3e0475058046f7ccfe8a141070d441423544f2b0d99ad31932bc61e94f9c3517bebf027305c3af501fedbbe28bea75771ca6322032d8d7c