Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
2daa6b7ec9e9dd35a7786a852159bf40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2daa6b7ec9e9dd35a7786a852159bf40.exe
Resource
win10v2004-20231215-en
General
-
Target
2daa6b7ec9e9dd35a7786a852159bf40.exe
-
Size
100KB
-
MD5
2daa6b7ec9e9dd35a7786a852159bf40
-
SHA1
b7c70e0743e46f050c0b0cf527f4eea4258e6a77
-
SHA256
0298ab2ccbd05d1cd4e5046c72693e301368fbe6c7ed571e99847f0ca750e197
-
SHA512
cf1748678d9d98f043119767bb403a21b606a610445c1fc6ebf699c497bc25fcc65d44028b7af1b09f67684196e767926b5fa3ac3e77dad1f10b7690f08dc40d
-
SSDEEP
1536:x4l0cc5BndOB+dGrNjjmJ2NuKuFr1M5B4QbCcIw9:D5BdOB++jOW99
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2daa6b7ec9e9dd35a7786a852159bf40.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lejuh.exe -
Executes dropped EXE 1 IoCs
pid Process 2776 lejuh.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /V" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /d" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /b" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /q" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /K" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /p" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /H" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /h" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /S" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /x" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /n" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /F" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /D" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /W" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /g" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /s" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /t" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /w" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /Q" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /B" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /A" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /R" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /g" 2daa6b7ec9e9dd35a7786a852159bf40.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /I" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /L" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /N" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /T" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /e" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /k" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /u" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /j" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /X" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /l" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /i" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /Y" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /Z" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /C" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /c" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /P" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /G" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /U" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /r" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /m" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /a" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /z" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /M" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /y" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /O" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /v" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /J" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /E" lejuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\lejuh = "C:\\Users\\Admin\\lejuh.exe /f" lejuh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe 2776 lejuh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 2776 lejuh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2776 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 28 PID 2888 wrote to memory of 2776 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 28 PID 2888 wrote to memory of 2776 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 28 PID 2888 wrote to memory of 2776 2888 2daa6b7ec9e9dd35a7786a852159bf40.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2daa6b7ec9e9dd35a7786a852159bf40.exe"C:\Users\Admin\AppData\Local\Temp\2daa6b7ec9e9dd35a7786a852159bf40.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\lejuh.exe"C:\Users\Admin\lejuh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5bf4384f45f1c5158cbdf5622e6055af5
SHA1fe05e9382ac9c7b64a1394791db90cc5d728c069
SHA2562591fd7026d2e1d6e4a39745d6abc50867489b58c4b56696e3b4ea1ab1d0f14d
SHA5129aefc8a914c1aea91eabfce5b66fc063c563abf663e039c8cd17a4f59ac92dfd2df7aa4e962c5dc96330436b35a4a40cb9692d4e89fea82d4839bfcb52ae72b8