Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 23:08
Static task
static1
Behavioral task
behavioral1
Sample
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe
Resource
win10v2004-20221111-en
General
-
Target
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe
-
Size
228KB
-
MD5
378320f877c24e3998be2c810beb18ee
-
SHA1
b58b2730801592c894e6bcf5859037a4d53a9186
-
SHA256
8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373
-
SHA512
ed2fec147e2aff8da70555192dc6b2e668dd7eca989f6f8b59763d3da8e39822ddc300acffcf3ebafb826419882570de80a1819ba9999f39a41dcc44291176e2
-
SSDEEP
3072:3fCnKOFCsv/CL0ns7bFtRdVWCyiHCN1ps/N:anRIsi1HFj/WCyiHCNfs1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dihok.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 dihok.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /y" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /k" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /a" dihok.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /v" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /f" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /p" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /l" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /i" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /n" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /h" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /j" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /g" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /x" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /r" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /d" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /o" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /w" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /m" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /u" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /b" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /c" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /e" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /s" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /q" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /z" dihok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /i" 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dihok = "C:\\Users\\Admin\\dihok.exe /t" dihok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1120 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 1120 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe 3060 dihok.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1120 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 3060 dihok.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1120 wrote to memory of 3060 1120 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 86 PID 1120 wrote to memory of 3060 1120 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 86 PID 1120 wrote to memory of 3060 1120 8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe"C:\Users\Admin\AppData\Local\Temp\8ea583885a75dd96cad8c484e186e06f79ef98d549d551f84506ead1495b4373.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\dihok.exe"C:\Users\Admin\dihok.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD501bd79bb3abd89bab9c5872eb03e49e4
SHA18efe2170644935c0eea130a36a147f050bb4ff71
SHA256b8b4cf157222a9e9edfbbe167b6a88a4f4a61d7bb970516957b5ac9df89ad2e2
SHA512500692b8f6c5ed1e7040636fd13252d04ff40c899d46281da7dbe51bbfcd6d7a3dbab4ba05aaab394eb5be366a7a15e664547e00856caaa67e580207807fe607
-
Filesize
228KB
MD501bd79bb3abd89bab9c5872eb03e49e4
SHA18efe2170644935c0eea130a36a147f050bb4ff71
SHA256b8b4cf157222a9e9edfbbe167b6a88a4f4a61d7bb970516957b5ac9df89ad2e2
SHA512500692b8f6c5ed1e7040636fd13252d04ff40c899d46281da7dbe51bbfcd6d7a3dbab4ba05aaab394eb5be366a7a15e664547e00856caaa67e580207807fe607