Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe
Resource
win10v2004-20220901-en
General
-
Target
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe
-
Size
156KB
-
MD5
053660ef5a34f021a8b3b30999a2e680
-
SHA1
31cd28969cf34ed5b79c32b7eda7fe6131dfda28
-
SHA256
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef
-
SHA512
5a566d5748985cad48f5e957e56333da412ba3d08a50f8efae91b8e578e8e7e7a9145ffc7a88a057bd8c3cd526542b6d1066e710464030221dfd1ffe85eebf30
-
SSDEEP
3072:QBd1vE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANA4oQZiEB9g:SdpE2R7Qvb4tQTaCeFP4A+WC
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tuegaer.exe -
Executes dropped EXE 1 IoCs
pid Process 472 tuegaer.exe -
Loads dropped DLL 2 IoCs
pid Process 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe -
Adds Run key to start application 2 TTPs 45 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /k" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /P" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /K" tuegaer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /v" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /O" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /a" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /H" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /x" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /m" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /Y" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /A" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /y" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /D" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /I" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /j" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /z" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /g" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /b" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /B" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /h" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /u" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /w" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /G" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /q" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /V" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /U" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /F" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /L" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /i" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /M" tuegaer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /c" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /p" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /r" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /Q" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /o" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /X" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /S" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /W" a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /Z" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /T" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /l" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /s" tuegaer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tuegaer = "C:\\Users\\Admin\\tuegaer.exe /d" tuegaer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe 472 tuegaer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 472 tuegaer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1276 wrote to memory of 472 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 28 PID 1276 wrote to memory of 472 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 28 PID 1276 wrote to memory of 472 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 28 PID 1276 wrote to memory of 472 1276 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe"C:\Users\Admin\AppData\Local\Temp\a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\tuegaer.exe"C:\Users\Admin\tuegaer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD55c6bce01c91aa1cc28cd36d919a07de2
SHA177b35c713d7ec4b60e56e7fb6e6b7d2ccb28b323
SHA256739533584edc14be6333992d5fe6ee41c9f0f53d354a7364204d1a05a9224adc
SHA512a69d0a697991960c567a915656ec331d79fe0c0cc7bb8e13f837edbb021777f46d50aca7095b60761ae306a7f0308203e3f5791d33b2572620aa333ece33479b
-
Filesize
156KB
MD55c6bce01c91aa1cc28cd36d919a07de2
SHA177b35c713d7ec4b60e56e7fb6e6b7d2ccb28b323
SHA256739533584edc14be6333992d5fe6ee41c9f0f53d354a7364204d1a05a9224adc
SHA512a69d0a697991960c567a915656ec331d79fe0c0cc7bb8e13f837edbb021777f46d50aca7095b60761ae306a7f0308203e3f5791d33b2572620aa333ece33479b
-
Filesize
156KB
MD55c6bce01c91aa1cc28cd36d919a07de2
SHA177b35c713d7ec4b60e56e7fb6e6b7d2ccb28b323
SHA256739533584edc14be6333992d5fe6ee41c9f0f53d354a7364204d1a05a9224adc
SHA512a69d0a697991960c567a915656ec331d79fe0c0cc7bb8e13f837edbb021777f46d50aca7095b60761ae306a7f0308203e3f5791d33b2572620aa333ece33479b
-
Filesize
156KB
MD55c6bce01c91aa1cc28cd36d919a07de2
SHA177b35c713d7ec4b60e56e7fb6e6b7d2ccb28b323
SHA256739533584edc14be6333992d5fe6ee41c9f0f53d354a7364204d1a05a9224adc
SHA512a69d0a697991960c567a915656ec331d79fe0c0cc7bb8e13f837edbb021777f46d50aca7095b60761ae306a7f0308203e3f5791d33b2572620aa333ece33479b