Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe
Resource
win10v2004-20220901-en
General
-
Target
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe
-
Size
156KB
-
MD5
053660ef5a34f021a8b3b30999a2e680
-
SHA1
31cd28969cf34ed5b79c32b7eda7fe6131dfda28
-
SHA256
a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef
-
SHA512
5a566d5748985cad48f5e957e56333da412ba3d08a50f8efae91b8e578e8e7e7a9145ffc7a88a057bd8c3cd526542b6d1066e710464030221dfd1ffe85eebf30
-
SSDEEP
3072:QBd1vE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANA4oQZiEB9g:SdpE2R7Qvb4tQTaCeFP4A+WC
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heagiy.exe -
Executes dropped EXE 1 IoCs
pid Process 4824 heagiy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /c" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /r" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /H" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /P" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /j" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /z" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /L" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /d" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /a" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /K" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /p" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /i" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /J" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /D" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /f" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /m" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /w" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /b" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /W" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /M" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /Q" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /C" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /q" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /v" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /h" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /g" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /E" heagiy.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /n" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /T" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /t" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /V" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /B" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /l" heagiy.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /I" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /X" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /Y" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /e" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /G" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /A" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /k" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /s" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /R" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /F" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /y" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /o" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /Z" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /S" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /O" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /N" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /S" a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /x" heagiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\heagiy = "C:\\Users\\Admin\\heagiy.exe /u" heagiy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1560 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 1560 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe 4824 heagiy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1560 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 4824 heagiy.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4824 1560 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 81 PID 1560 wrote to memory of 4824 1560 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 81 PID 1560 wrote to memory of 4824 1560 a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe"C:\Users\Admin\AppData\Local\Temp\a027195cff05ddac08c640283a51a0ef3ef2a511e47a2608fa98a9ee8c034fef.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\heagiy.exe"C:\Users\Admin\heagiy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5a9be62e4b4b397996f3b06fcb99ed996
SHA11016ca4bfa7d42a54c2a885a7c658252a781393d
SHA256fe328ba05139731ec1a1cdeffed6630ffd10384a0510902c158f96208cfe2d90
SHA512fdf36dc5929649a863d2cbbe187f979cbf7382b5e1ded737b0d414d3cc9b257c6213e99f1766037d0295d0c2445c44614ab7530210051b7e6dfc6450fc201ecd
-
Filesize
156KB
MD5a9be62e4b4b397996f3b06fcb99ed996
SHA11016ca4bfa7d42a54c2a885a7c658252a781393d
SHA256fe328ba05139731ec1a1cdeffed6630ffd10384a0510902c158f96208cfe2d90
SHA512fdf36dc5929649a863d2cbbe187f979cbf7382b5e1ded737b0d414d3cc9b257c6213e99f1766037d0295d0c2445c44614ab7530210051b7e6dfc6450fc201ecd