Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe
Resource
win10v2004-20221111-en
General
-
Target
802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe
-
Size
200KB
-
MD5
3c366eeab105147a0fec0dbda43eab72
-
SHA1
ef11caa0c3dd43636e8ff8091ffaf15b12847515
-
SHA256
802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce
-
SHA512
867d5b83188f90b204135a40120183d3d215f1d8c2f733c555d7c9cacf2da69d7197ff495fba1ef28ae149a62109126e9c2ed2ab6adf3879e3ed46d45bd2c213
-
SSDEEP
3072:8COTo/0YxAS0tQ9nLHbB9WPliBs2HWWEakGJm9GD:8CXCS4QxL7B9WPli+yWWEazb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voabae.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe -
Executes dropped EXE 1 IoCs
pid Process 1548 voabae.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /w" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /h" voabae.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /k" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /z" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /b" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /j" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /s" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /q" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /f" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /o" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /e" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /p" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /d" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /a" voabae.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /i" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /v" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /y" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /t" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /c" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /n" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /g" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /x" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /l" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /t" 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /u" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /m" voabae.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voabae = "C:\\Users\\Admin\\voabae.exe /r" voabae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4192 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe 4192 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe 1548 voabae.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4192 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe 1548 voabae.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4192 wrote to memory of 1548 4192 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe 83 PID 4192 wrote to memory of 1548 4192 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe 83 PID 4192 wrote to memory of 1548 4192 802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe"C:\Users\Admin\AppData\Local\Temp\802efaaf2001203c94fa2231e868e6d36193c943b7c572f1c25e79ffb92f2fce.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\voabae.exe"C:\Users\Admin\voabae.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5558060157f2bbbd785cabbd8a0a6fb3c
SHA165e87012d0b4e86eedaf90ca1eebd87df2c67264
SHA256c76c37b29223a4436e4c63b1a81b69ae5655d86ee69718ab2c46583695490fa4
SHA51258bc8c066bb074a9206a584225c2d5630fc77daff6789e98aa1036c8adc6b8dd42891bbf664d6632aa3a665635a5c852cb842f6188d9dcbdadc9f1ddc0c43fa9
-
Filesize
200KB
MD5558060157f2bbbd785cabbd8a0a6fb3c
SHA165e87012d0b4e86eedaf90ca1eebd87df2c67264
SHA256c76c37b29223a4436e4c63b1a81b69ae5655d86ee69718ab2c46583695490fa4
SHA51258bc8c066bb074a9206a584225c2d5630fc77daff6789e98aa1036c8adc6b8dd42891bbf664d6632aa3a665635a5c852cb842f6188d9dcbdadc9f1ddc0c43fa9