Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe
Resource
win10v2004-20220812-en
General
-
Target
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe
-
Size
232KB
-
MD5
5574f7c11369e28e9fce030385b00ccc
-
SHA1
279bbae4c93247c8c959cd5776a78735df60902c
-
SHA256
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766
-
SHA512
30097d0711f3708b9d797aa2f4713b0293322e903e780ebaf1a43b800386da1319ee5ee05a8626dd959edf4ecf3ad0a7688d32f25cb91bf39d387b0ec2381191
-
SSDEEP
3072:jgXVlhx5v2gKvvyMZe+EVv64QWCyiHCqV/G0/J:ifKHyMwhVv6vWCyiHCqV/G0x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qoiuk.exe -
Executes dropped EXE 1 IoCs
pid Process 64 qoiuk.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /j" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /k" qoiuk.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /h" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /z" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /v" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /s" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /i" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /r" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /y" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /b" qoiuk.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /a" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /m" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /g" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /f" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /x" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /d" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /u" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /n" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /w" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /e" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /c" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /l" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /d" 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /t" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /q" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /o" qoiuk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qoiuk = "C:\\Users\\Admin\\qoiuk.exe /p" qoiuk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4204 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 4204 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe 64 qoiuk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4204 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 64 qoiuk.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4204 wrote to memory of 64 4204 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 80 PID 4204 wrote to memory of 64 4204 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 80 PID 4204 wrote to memory of 64 4204 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe"C:\Users\Admin\AppData\Local\Temp\64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\qoiuk.exe"C:\Users\Admin\qoiuk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:64
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD580e059715990982144b4038e45e79ad5
SHA17c34d8c07311bd82c2c6dcd5432f0f92755b650b
SHA256c0672a61900c088d0597d657fa360dae13675cf51e0afdc83dac5fbe05250a89
SHA512b63ca3a0662d53b914f607fe1efe45370e2806f3d07a3da36eed100487fba08de0372be1a621baf37a886d81dc9d61c15afae175879d507d73ec5bfb8acfe790
-
Filesize
232KB
MD580e059715990982144b4038e45e79ad5
SHA17c34d8c07311bd82c2c6dcd5432f0f92755b650b
SHA256c0672a61900c088d0597d657fa360dae13675cf51e0afdc83dac5fbe05250a89
SHA512b63ca3a0662d53b914f607fe1efe45370e2806f3d07a3da36eed100487fba08de0372be1a621baf37a886d81dc9d61c15afae175879d507d73ec5bfb8acfe790