Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe
Resource
win10v2004-20221111-en
General
-
Target
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe
-
Size
228KB
-
MD5
378320f877c24e3998be2c810beb18ee
-
SHA1
b58b2730801592c894e6bcf5859037a4d53a9186
-
SHA256
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373
-
SHA512
ed2fec147e2aff8da70555192dc6b2e668dd7eca989f6f8b59763d3da8e39822ddc300acffcf3ebafb826419882570de80a1819ba9999f39a41dcc44291176e2
-
SSDEEP
3072:3fCnKOFCsv/CL0ns7bFtRdVWCyiHCN1ps/N:anRIsi1HFj/WCyiHCNfs1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koopup.exe -
Executes dropped EXE 1 IoCs
pid Process 1984 koopup.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /x" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /r" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /z" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /g" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /b" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /c" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /w" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /t" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /v" koopup.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /m" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /h" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /y" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /n" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /q" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /k" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /l" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /u" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /s" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /d" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /i" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /j" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /e" koopup.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /a" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /p" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /f" koopup.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /y" 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koopup = "C:\\Users\\Admin\\koopup.exe /o" koopup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe 1984 koopup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 1984 koopup.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1984 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 26 PID 1992 wrote to memory of 1984 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 26 PID 1992 wrote to memory of 1984 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 26 PID 1992 wrote to memory of 1984 1992 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe"C:\Users\Admin\AppData\Local\Temp\8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\koopup.exe"C:\Users\Admin\koopup.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5db0840f94d2a92cf40da5240c0d81b3a
SHA1165345d4eaa2c6e83ace66fb1139ee86502ee9b3
SHA256505039eedd86d944935e4d0b3e81fd95f8ab0bb83be45c06f7d5bd80ba1bf16d
SHA512fa5d90e68538bd8ea15982da199132ad51b6b2af96b0d2a489d2472e7d433164751ccbfe4b6311167d96af0bb080560a39fa0934e05d550d1eab7c35c35815c4
-
Filesize
228KB
MD5db0840f94d2a92cf40da5240c0d81b3a
SHA1165345d4eaa2c6e83ace66fb1139ee86502ee9b3
SHA256505039eedd86d944935e4d0b3e81fd95f8ab0bb83be45c06f7d5bd80ba1bf16d
SHA512fa5d90e68538bd8ea15982da199132ad51b6b2af96b0d2a489d2472e7d433164751ccbfe4b6311167d96af0bb080560a39fa0934e05d550d1eab7c35c35815c4
-
Filesize
228KB
MD5db0840f94d2a92cf40da5240c0d81b3a
SHA1165345d4eaa2c6e83ace66fb1139ee86502ee9b3
SHA256505039eedd86d944935e4d0b3e81fd95f8ab0bb83be45c06f7d5bd80ba1bf16d
SHA512fa5d90e68538bd8ea15982da199132ad51b6b2af96b0d2a489d2472e7d433164751ccbfe4b6311167d96af0bb080560a39fa0934e05d550d1eab7c35c35815c4
-
Filesize
228KB
MD5db0840f94d2a92cf40da5240c0d81b3a
SHA1165345d4eaa2c6e83ace66fb1139ee86502ee9b3
SHA256505039eedd86d944935e4d0b3e81fd95f8ab0bb83be45c06f7d5bd80ba1bf16d
SHA512fa5d90e68538bd8ea15982da199132ad51b6b2af96b0d2a489d2472e7d433164751ccbfe4b6311167d96af0bb080560a39fa0934e05d550d1eab7c35c35815c4