Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
b0b28995ea589ea1e73cba0baea7a4e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b0b28995ea589ea1e73cba0baea7a4e5.exe
Resource
win10v2004-20231215-en
General
-
Target
b0b28995ea589ea1e73cba0baea7a4e5.exe
-
Size
196KB
-
MD5
b0b28995ea589ea1e73cba0baea7a4e5
-
SHA1
725ffcfc889c4e801565a2140f3063306dde4e0c
-
SHA256
7736212307d27552749ad5aa6682394be313bc1f302ae177fe955dd48a13e0db
-
SHA512
5e48629e683dde26d284eeceea17e64aa70100c2113f3fe57fda911375009ae6092372696a9fe51fcbcbea060780d76a8bb629deb1606df6e8a22f94c21e3d3e
-
SSDEEP
3072:0y1rAga0tQ9nLHbB9WmvA7vejJWKvE+Kmp2:pq4QxL7B9WjjejJW5T
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" suuaji.exe Set value (int) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b0b28995ea589ea1e73cba0baea7a4e5.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 suuaji.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /y" b0b28995ea589ea1e73cba0baea7a4e5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /o" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /v" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /c" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /x" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /g" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /b" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /q" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /u" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /n" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /p" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /s" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /j" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /w" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /r" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /d" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /z" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /y" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /t" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /i" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /m" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /f" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /k" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /h" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /l" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /e" suuaji.exe Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\suuaji = "C:\\Users\\Admin\\suuaji.exe /a" suuaji.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe 2736 suuaji.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 2736 suuaji.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2736 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 29 PID 2004 wrote to memory of 2736 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 29 PID 2004 wrote to memory of 2736 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 29 PID 2004 wrote to memory of 2736 2004 b0b28995ea589ea1e73cba0baea7a4e5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0b28995ea589ea1e73cba0baea7a4e5.exe"C:\Users\Admin\AppData\Local\Temp\b0b28995ea589ea1e73cba0baea7a4e5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\suuaji.exe"C:\Users\Admin\suuaji.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD50c7fc2d4676f40d7f5ef95187a6e865b
SHA13e1199661e180abd12702b5c83011d3ef7a3bb3f
SHA256cf098ac4b08a31b5bbc029a35cc4babf92d88ec04c0a09236ba9d3d5d3353cc1
SHA512df82ddac05c557e6e642ae01fae9bf1dcc3524ac733d78a214088ac065b24ef194ff0fcc560158e2ed2970bd60f421769cdc4183c2563be05369be99f4c9de17