Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe
Resource
win10v2004-20220812-en
General
-
Target
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe
-
Size
204KB
-
MD5
5c8dbbf75c7bd4a5cfcb69c400cb495f
-
SHA1
7097d92dc0f597eec3357c96765b21d57de63de9
-
SHA256
c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369
-
SHA512
97cbca4ae63b836c0d829de438418f43fa24b84cef064a4fcf640b71db9bb2110768754639d75c489ffc3e7edf377f1b365e4258e2e6d039bc98ac8c316e4a72
-
SSDEEP
1536:GR+Oo7Ho1vzxHwx7xNy3tQ9CW5EZWHakMwP9W6uXNh9h1AWa11GBPIdRONd+w61m:LHo1C0tQ9nLHbB9WTk9+JgqmlHKn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" beicueq.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 beicueq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /f" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /i" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /w" beicueq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /z" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /u" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /n" c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /b" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /l" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /s" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /d" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /n" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /o" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /m" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /g" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /p" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /k" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /v" beicueq.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /h" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /j" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /x" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /q" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /c" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /t" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /r" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /a" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /e" beicueq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\beicueq = "C:\\Users\\Admin\\beicueq.exe /y" beicueq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 2732 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe 2864 beicueq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2732 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 2864 beicueq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2864 2732 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 76 PID 2732 wrote to memory of 2864 2732 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 76 PID 2732 wrote to memory of 2864 2732 c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe"C:\Users\Admin\AppData\Local\Temp\c693e35d16bb54da65546eae8a94380eb5cd3e3a0d749ade8ba96102817a5369.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\beicueq.exe"C:\Users\Admin\beicueq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD55bb75f89a9c9c348915f4dae5b2a8f09
SHA106373a45c4126bf9ec0872d8481cbf711a593de5
SHA2562b64dc31d61d8b8a3930007d562eae2989210d4f599156cca98930036bb042c0
SHA512d754ed6f4de9a6f5b7d8750868cac20de4406430cf65b308757cb5616b8402d6a6f81219749b7613c6aa038f46602cdf460eb4a2fb889ccf8db4a16440fca716
-
Filesize
204KB
MD55bb75f89a9c9c348915f4dae5b2a8f09
SHA106373a45c4126bf9ec0872d8481cbf711a593de5
SHA2562b64dc31d61d8b8a3930007d562eae2989210d4f599156cca98930036bb042c0
SHA512d754ed6f4de9a6f5b7d8750868cac20de4406430cf65b308757cb5616b8402d6a6f81219749b7613c6aa038f46602cdf460eb4a2fb889ccf8db4a16440fca716