Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe
Resource
win10v2004-20221111-en
General
-
Target
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe
-
Size
248KB
-
MD5
7ce76d506a9ce67a304fc407505434ce
-
SHA1
5b1f3545ee9bf9bb0a04819af9c973c989bb0a24
-
SHA256
db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5
-
SHA512
c74be949736b1a8fc80d55772474cc5744264abe7186d6ea96e9e75845a8e81d147d5fa99c8cd91a60f2fb6b6b6133c95d955cbb611afdd4cbea2f3676072ba0
-
SSDEEP
3072:5frBXUxghqYaGUe1AK8b/EQk28wlowMmbz1gNNdeHd1fdVcjsQyO1obdmeBnZZk:tVt71U/EQk28wlowbIGysQs5me1Zi
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saufuo.exe -
Executes dropped EXE 1 IoCs
pid Process 4984 saufuo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /y" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /u" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /h" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /a" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /f" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /o" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /m" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /r" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /p" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /x" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /d" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /b" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /g" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /f" db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /j" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /v" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /s" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /i" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /n" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /q" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /e" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /z" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /w" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /t" saufuo.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /c" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /l" saufuo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saufuo = "C:\\Users\\Admin\\saufuo.exe /k" saufuo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2584 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 2584 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe 4984 saufuo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2584 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 4984 saufuo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2584 wrote to memory of 4984 2584 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 85 PID 2584 wrote to memory of 4984 2584 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 85 PID 2584 wrote to memory of 4984 2584 db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe"C:\Users\Admin\AppData\Local\Temp\db2d0b226578f134051f6eb05f6413215823492c8bea6f089c1efb281ecd23a5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\saufuo.exe"C:\Users\Admin\saufuo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD55e53629100748dd1334560b54da43106
SHA1e469ef493a35d20cf220bfa03800a2dda38b5495
SHA2563e4576e6cb6df860249616f58bc238008cee3105cb0659f921f22bff2ff88f0c
SHA512edf5b0a9473c05751b80abf72208ca15b0876cdcba83bf3e684329b8a0aa58ca23683ced8d66f8fac175b6db149f1a7309efd7567f46411ce4cccda48eb8f8e4
-
Filesize
248KB
MD55e53629100748dd1334560b54da43106
SHA1e469ef493a35d20cf220bfa03800a2dda38b5495
SHA2563e4576e6cb6df860249616f58bc238008cee3105cb0659f921f22bff2ff88f0c
SHA512edf5b0a9473c05751b80abf72208ca15b0876cdcba83bf3e684329b8a0aa58ca23683ced8d66f8fac175b6db149f1a7309efd7567f46411ce4cccda48eb8f8e4