Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe
Resource
win10v2004-20220812-en
General
-
Target
28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe
-
Size
296KB
-
MD5
2a8f110a8efc574099c7e77d6884d33a
-
SHA1
dfeac335b0acfecdab7d169c3e32824d6fcab4b3
-
SHA256
28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3
-
SHA512
c3bf4e42be93168168a792c201f2a25e2007e17fec3d8fe7dd37bbc2dc374173ef8d1bfefe548156bbf840ab4f6ba8262726361d7dd0ed86c67b5eb1b7dcedd0
-
SSDEEP
6144:sOyaKkrONaJ2BHzDtU7b5dU14Uf797SNIbVRGAw2+8e9KZPY88Nb:s/QrO2CzqX5dS7cuDGH2+8xm88F
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gueop.exe -
Executes dropped EXE 1 IoCs
pid Process 940 gueop.exe -
Loads dropped DLL 2 IoCs
pid Process 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /l" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /G" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /u" gueop.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /c" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /B" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /x" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /b" gueop.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /t" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /r" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /T" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /j" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /A" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /k" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /I" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /D" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /R" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /v" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /U" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /E" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /P" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /S" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /O" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /h" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /e" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /i" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /g" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /H" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /L" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /V" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /m" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /o" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /Q" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /n" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /f" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /d" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /K" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /s" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /Y" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /C" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /M" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /p" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /w" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /x" 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /z" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /J" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /a" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /y" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /F" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /q" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /N" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /Z" gueop.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\gueop = "C:\\Users\\Admin\\gueop.exe /X" gueop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe 940 gueop.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 940 gueop.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 852 wrote to memory of 940 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 27 PID 852 wrote to memory of 940 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 27 PID 852 wrote to memory of 940 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 27 PID 852 wrote to memory of 940 852 28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe"C:\Users\Admin\AppData\Local\Temp\28195eea465777d5c6346d4f04e2f19dbce7ba99c7582df0e6f9818857f728a3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\gueop.exe"C:\Users\Admin\gueop.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5e7cbb208eec83fd12583171d14b93d0c
SHA1be4187f7efbe21c1e06e988661464d14062df152
SHA25641cfc6d2cd0d29a7f3dba536496177fa4e9d5dacd7453beae6947383154deeea
SHA5129664ff396c1fd112487bc794cc0213fcd2023076fd1bdfeb4e5f30c592bc20e8b128bc3bdec33e22b3589f003abf84d98478c2f32f422684d4dd01ee56cd87bc
-
Filesize
296KB
MD5e7cbb208eec83fd12583171d14b93d0c
SHA1be4187f7efbe21c1e06e988661464d14062df152
SHA25641cfc6d2cd0d29a7f3dba536496177fa4e9d5dacd7453beae6947383154deeea
SHA5129664ff396c1fd112487bc794cc0213fcd2023076fd1bdfeb4e5f30c592bc20e8b128bc3bdec33e22b3589f003abf84d98478c2f32f422684d4dd01ee56cd87bc
-
Filesize
296KB
MD5e7cbb208eec83fd12583171d14b93d0c
SHA1be4187f7efbe21c1e06e988661464d14062df152
SHA25641cfc6d2cd0d29a7f3dba536496177fa4e9d5dacd7453beae6947383154deeea
SHA5129664ff396c1fd112487bc794cc0213fcd2023076fd1bdfeb4e5f30c592bc20e8b128bc3bdec33e22b3589f003abf84d98478c2f32f422684d4dd01ee56cd87bc
-
Filesize
296KB
MD5e7cbb208eec83fd12583171d14b93d0c
SHA1be4187f7efbe21c1e06e988661464d14062df152
SHA25641cfc6d2cd0d29a7f3dba536496177fa4e9d5dacd7453beae6947383154deeea
SHA5129664ff396c1fd112487bc794cc0213fcd2023076fd1bdfeb4e5f30c592bc20e8b128bc3bdec33e22b3589f003abf84d98478c2f32f422684d4dd01ee56cd87bc