Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe
Resource
win10v2004-20221111-en
General
-
Target
03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe
-
Size
96KB
-
MD5
b9248e7d937265db39e7f415612ac184
-
SHA1
6a4479d6416c340d77db5f803e5f03f02af953bd
-
SHA256
03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6
-
SHA512
203e96c020dd95ffa369324ffaa15d4e0785ec024e6741b9dc0fc13e596fa08282bb8cda26250ed21d8d558ea2527a674eff0fdb4f204d5f5ef82f5c68bf4601
-
SSDEEP
1536:33hBHbf6cOahhkGulSc16l6u+NMMl/KlYv1T4hThFgNIjnZan:fhhGlu88FFgCn8n
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" huuce.exe -
Executes dropped EXE 1 IoCs
pid Process 544 huuce.exe -
Loads dropped DLL 2 IoCs
pid Process 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe -
Adds Run key to start application 2 TTPs 47 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /p" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /E" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /r" huuce.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /j" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /A" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /w" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /X" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /V" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /f" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /z" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /c" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /C" huuce.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /R" 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /d" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /N" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /J" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /L" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /i" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /D" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /H" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /k" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /M" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /h" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /q" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /a" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /t" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /y" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /F" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /n" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /s" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /U" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /B" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /l" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /Z" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /T" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /Q" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /W" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /v" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /u" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /Y" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /b" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /S" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /O" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /I" huuce.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\huuce = "C:\\Users\\Admin\\huuce.exe /R" huuce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe 544 huuce.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 544 huuce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1296 wrote to memory of 544 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 27 PID 1296 wrote to memory of 544 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 27 PID 1296 wrote to memory of 544 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 27 PID 1296 wrote to memory of 544 1296 03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe"C:\Users\Admin\AppData\Local\Temp\03fc86ce395594d7236ebc8f654e14b1b416369d393ef68bc735c02e5078eaf6.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\huuce.exe"C:\Users\Admin\huuce.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59add01a1ecd3add18143ed0c698ffc88
SHA175725c30def2a66a493a2175b77e844b6a1ac716
SHA2565b2511cf30e43be282a3c0b61e1e687e4a0f887d9b481ebf8dfa74564ffcda37
SHA51204ae2039250f65274d85c9c4d4505fbfb6dd0ae4160ef20be5e154be199034c6c265a5358ed3dbdc582e034f2c8d4a468ff4c1a640622096b107944bf3ea9b2a
-
Filesize
96KB
MD59add01a1ecd3add18143ed0c698ffc88
SHA175725c30def2a66a493a2175b77e844b6a1ac716
SHA2565b2511cf30e43be282a3c0b61e1e687e4a0f887d9b481ebf8dfa74564ffcda37
SHA51204ae2039250f65274d85c9c4d4505fbfb6dd0ae4160ef20be5e154be199034c6c265a5358ed3dbdc582e034f2c8d4a468ff4c1a640622096b107944bf3ea9b2a
-
Filesize
96KB
MD59add01a1ecd3add18143ed0c698ffc88
SHA175725c30def2a66a493a2175b77e844b6a1ac716
SHA2565b2511cf30e43be282a3c0b61e1e687e4a0f887d9b481ebf8dfa74564ffcda37
SHA51204ae2039250f65274d85c9c4d4505fbfb6dd0ae4160ef20be5e154be199034c6c265a5358ed3dbdc582e034f2c8d4a468ff4c1a640622096b107944bf3ea9b2a
-
Filesize
96KB
MD59add01a1ecd3add18143ed0c698ffc88
SHA175725c30def2a66a493a2175b77e844b6a1ac716
SHA2565b2511cf30e43be282a3c0b61e1e687e4a0f887d9b481ebf8dfa74564ffcda37
SHA51204ae2039250f65274d85c9c4d4505fbfb6dd0ae4160ef20be5e154be199034c6c265a5358ed3dbdc582e034f2c8d4a468ff4c1a640622096b107944bf3ea9b2a