Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe
Resource
win10v2004-20221111-en
General
-
Target
d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe
-
Size
316KB
-
MD5
8aa3ee839270cb28d05534f3fd5721d2
-
SHA1
be496410a16b7bd22d04c5234cfb10c0f00c3514
-
SHA256
d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db
-
SHA512
52ef0db49cdf4a3e2f43d910e170afdb12568a8d31f6c6a7987b7d99730983e99e744f2d3c80e8efed20ed57986d0eb57a2836a6a270cd4f5aebae0178ba82b0
-
SSDEEP
3072:VZJwhpF3SpWufu/muESamFi5eLb532qRgzqRe/aT4E1KZnBmaNtDvJRZ8Ng0ykdi:VZ43jb532qRmqRe/aT4EYDmaNtNRKNi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koeafi.exe -
Executes dropped EXE 1 IoCs
pid Process 1868 koeafi.exe -
Loads dropped DLL 2 IoCs
pid Process 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /q" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /b" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /s" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /n" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /y" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /t" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /a" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /k" koeafi.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /r" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /o" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /j" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /u" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /i" d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /v" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /l" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /m" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /h" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /i" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /x" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /w" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /g" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /z" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /e" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /p" koeafi.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\koeafi = "C:\\Users\\Admin\\koeafi.exe /d" koeafi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe 1868 koeafi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 1868 koeafi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 364 wrote to memory of 1868 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 26 PID 364 wrote to memory of 1868 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 26 PID 364 wrote to memory of 1868 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 26 PID 364 wrote to memory of 1868 364 d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe"C:\Users\Admin\AppData\Local\Temp\d064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\koeafi.exe"C:\Users\Admin\koeafi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1868
-
Network
-
Remote address:8.8.8.8:53Requestns1.helpupdates.bizIN AResponse
-
Remote address:8.8.8.8:53Requestns1.helpupdates.bizIN AResponse
-
Remote address:8.8.8.8:53Requestns1.helpupdates.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.helpupdates.comIN AResponse
-
Remote address:8.8.8.8:53Requestns1.helpupdates.orgIN AResponse
-
Remote address:8.8.8.8:53Requestns1.helpupdates.infoIN AResponse
-
8.8.8.8:53ns1.helpupdates.bizdnsd064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe130 B 254 B 2 2
DNS Request
ns1.helpupdates.biz
DNS Request
ns1.helpupdates.biz
-
8.8.8.8:53ns1.helpupdates.netdnsd064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe65 B 138 B 1 1
DNS Request
ns1.helpupdates.net
-
8.8.8.8:53ns1.helpupdates.comdnsd064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe65 B 133 B 1 1
DNS Request
ns1.helpupdates.com
-
8.8.8.8:53ns1.helpupdates.orgdnsd064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe65 B 147 B 1 1
DNS Request
ns1.helpupdates.org
-
8.8.8.8:53ns1.helpupdates.infodnsd064228c4138fbebb897dd0d74a69450ae58f1240ac9a33be7bb8e211f87a7db.exe66 B 145 B 1 1
DNS Request
ns1.helpupdates.info
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD5709c8dff4f21aa188fb7ef4eaf00ce63
SHA14d094a1851cae643638b280b4a094874959e8754
SHA256968dfe6e4cde87200a59efe818ee54290f0d45969bbb6eb853b3453b99d3248f
SHA512eb0e69bbb59bb5073f5b60a56ce1ba72d74046912787b63dcc7ab9433b7fe60ae2d7e103dea3e87f36e3b04d7ff7f2a0109f797723a75e61e7d47ea0de8d3e48
-
Filesize
316KB
MD5709c8dff4f21aa188fb7ef4eaf00ce63
SHA14d094a1851cae643638b280b4a094874959e8754
SHA256968dfe6e4cde87200a59efe818ee54290f0d45969bbb6eb853b3453b99d3248f
SHA512eb0e69bbb59bb5073f5b60a56ce1ba72d74046912787b63dcc7ab9433b7fe60ae2d7e103dea3e87f36e3b04d7ff7f2a0109f797723a75e61e7d47ea0de8d3e48
-
Filesize
316KB
MD5709c8dff4f21aa188fb7ef4eaf00ce63
SHA14d094a1851cae643638b280b4a094874959e8754
SHA256968dfe6e4cde87200a59efe818ee54290f0d45969bbb6eb853b3453b99d3248f
SHA512eb0e69bbb59bb5073f5b60a56ce1ba72d74046912787b63dcc7ab9433b7fe60ae2d7e103dea3e87f36e3b04d7ff7f2a0109f797723a75e61e7d47ea0de8d3e48
-
Filesize
316KB
MD5709c8dff4f21aa188fb7ef4eaf00ce63
SHA14d094a1851cae643638b280b4a094874959e8754
SHA256968dfe6e4cde87200a59efe818ee54290f0d45969bbb6eb853b3453b99d3248f
SHA512eb0e69bbb59bb5073f5b60a56ce1ba72d74046912787b63dcc7ab9433b7fe60ae2d7e103dea3e87f36e3b04d7ff7f2a0109f797723a75e61e7d47ea0de8d3e48