Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
2daa6b7ec9e9dd35a7786a852159bf40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2daa6b7ec9e9dd35a7786a852159bf40.exe
Resource
win10v2004-20231215-en
General
-
Target
2daa6b7ec9e9dd35a7786a852159bf40.exe
-
Size
100KB
-
MD5
2daa6b7ec9e9dd35a7786a852159bf40
-
SHA1
b7c70e0743e46f050c0b0cf527f4eea4258e6a77
-
SHA256
0298ab2ccbd05d1cd4e5046c72693e301368fbe6c7ed571e99847f0ca750e197
-
SHA512
cf1748678d9d98f043119767bb403a21b606a610445c1fc6ebf699c497bc25fcc65d44028b7af1b09f67684196e767926b5fa3ac3e77dad1f10b7690f08dc40d
-
SSDEEP
1536:x4l0cc5BndOB+dGrNjjmJ2NuKuFr1M5B4QbCcIw9:D5BdOB++jOW99
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2daa6b7ec9e9dd35a7786a852159bf40.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" baepej.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 2daa6b7ec9e9dd35a7786a852159bf40.exe -
Executes dropped EXE 1 IoCs
pid Process 1104 baepej.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /s" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /Z" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /J" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /m" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /H" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /t" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /q" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /k" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /F" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /K" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /e" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /j" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /f" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /c" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /V" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /g" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /C" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /U" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /N" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /h" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /y" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /L" 2daa6b7ec9e9dd35a7786a852159bf40.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /u" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /R" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /Q" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /a" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /E" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /z" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /S" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /W" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /X" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /G" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /A" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /r" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /Y" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /L" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /n" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /I" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /D" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /b" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /P" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /d" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /M" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /p" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /v" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /T" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /B" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /O" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /w" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /o" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /x" baepej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baepej = "C:\\Users\\Admin\\baepej.exe /l" baepej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1412 2daa6b7ec9e9dd35a7786a852159bf40.exe 1412 2daa6b7ec9e9dd35a7786a852159bf40.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe 1104 baepej.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1412 2daa6b7ec9e9dd35a7786a852159bf40.exe 1104 baepej.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1104 1412 2daa6b7ec9e9dd35a7786a852159bf40.exe 93 PID 1412 wrote to memory of 1104 1412 2daa6b7ec9e9dd35a7786a852159bf40.exe 93 PID 1412 wrote to memory of 1104 1412 2daa6b7ec9e9dd35a7786a852159bf40.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2daa6b7ec9e9dd35a7786a852159bf40.exe"C:\Users\Admin\AppData\Local\Temp\2daa6b7ec9e9dd35a7786a852159bf40.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\baepej.exe"C:\Users\Admin\baepej.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5c309f57e9ced2a25e793cf8a73efaa40
SHA19c6d67a697c5babc22f87f2f7b760f4f1e988afd
SHA25626649f98698efddd65f62a8ee25bd3c0082543988577f0a89f153510ddd072ae
SHA5126196a115e0f6f72290d50937ce86561c07ef6572348cda61d5c4243f6611104c2c6d17c7c3602b6bacf4531a1d0b849c77cacb87ac5b3e8de7bce75d223add9b