Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe
Resource
win10v2004-20220812-en
General
-
Target
92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe
-
Size
224KB
-
MD5
7124dcef46c91490e5ebe768f96a3179
-
SHA1
9764fe3c4ba6cb73a46a02e234213659cebeb16a
-
SHA256
92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c
-
SHA512
8bf2957bd2bd69d9ac034b786e2d0b204b53da90c8ab417fecb7d13c6db8ab96a8222e8b17987ab787612e7d0f894ca3a1cdfae6b1c2fa00ad0e7dfa993175a9
-
SSDEEP
3072:hiYBN7aWbqDImDrT+UvtkvnNBLieMyiayNe2XKrJlZmNlDY:hFBvuImDrT+U1QtMyiaO6mS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mcdiuq.exe -
Executes dropped EXE 1 IoCs
pid Process 3796 mcdiuq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /E" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /W" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /g" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /u" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /f" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /v" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /s" 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /V" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /t" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /Y" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /P" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /N" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /L" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /d" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /n" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /D" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /Z" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /s" mcdiuq.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /U" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /A" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /T" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /i" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /J" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /B" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /o" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /j" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /y" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /z" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /e" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /l" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /K" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /R" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /w" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /F" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /O" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /c" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /Q" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /H" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /k" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /I" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /r" mcdiuq.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /b" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /a" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /q" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /X" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /S" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /C" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /x" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /p" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /G" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /h" mcdiuq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mcdiuq = "C:\\Users\\Admin\\mcdiuq.exe /m" mcdiuq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3328 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe 3328 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe 3796 mcdiuq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3328 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe 3796 mcdiuq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3796 3328 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe 77 PID 3328 wrote to memory of 3796 3328 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe 77 PID 3328 wrote to memory of 3796 3328 92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe"C:\Users\Admin\AppData\Local\Temp\92195d2e3f40e5251f95d052d282986d9f54f04f8ea90103f61829ce02cb724c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\mcdiuq.exe"C:\Users\Admin\mcdiuq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD57e4b00ee5dfc930f81407e5e8b58cb28
SHA10050132d4de46b72eb4581c0d6c828a6c0def43c
SHA25677edadbe167065ab0967522b65a1afac99136a5461438bca2b72bf5bd9b700be
SHA51269e141764b3f3a7e8c4a8d2cf5fe48abc567d4c729a61b46f260a78b4bfc231637caffd316db3604ae291b4d5899e6d91146bae552cb8dcda387a440ad8cd9f0
-
Filesize
224KB
MD57e4b00ee5dfc930f81407e5e8b58cb28
SHA10050132d4de46b72eb4581c0d6c828a6c0def43c
SHA25677edadbe167065ab0967522b65a1afac99136a5461438bca2b72bf5bd9b700be
SHA51269e141764b3f3a7e8c4a8d2cf5fe48abc567d4c729a61b46f260a78b4bfc231637caffd316db3604ae291b4d5899e6d91146bae552cb8dcda387a440ad8cd9f0