Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
a93f49cdecf6e3a1002286682f19a3a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a93f49cdecf6e3a1002286682f19a3a5.exe
Resource
win10v2004-20231215-en
General
-
Target
a93f49cdecf6e3a1002286682f19a3a5.exe
-
Size
60KB
-
MD5
a93f49cdecf6e3a1002286682f19a3a5
-
SHA1
fa4f4e951a27cb3ce178a09214c9be71d63519fb
-
SHA256
fbe71273f4f34f65257a80646574b6951d3566799ffe2531353c0bb01a9a79a6
-
SHA512
1639fab5d3a2a2296c9310d7ed00652f1073f59da332ff2371ad67870cccbf9e9cd3844c4cb4296cde5fba3bda6eaa9387b8e66ba3d9fdaff2b1d04e5a2c7523
-
SSDEEP
768:hXSmpnBmNVpmkeu76+9A/v/bVlbdfs3OfKDHGIHY56W7:hXSNp+u76y43wY56W7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeabei.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 zeabei.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 a93f49cdecf6e3a1002286682f19a3a5.exe 2196 a93f49cdecf6e3a1002286682f19a3a5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeabei = "C:\\Users\\Admin\\zeabei.exe" zeabei.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe 2136 zeabei.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2196 a93f49cdecf6e3a1002286682f19a3a5.exe 2136 zeabei.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2136 2196 a93f49cdecf6e3a1002286682f19a3a5.exe 28 PID 2196 wrote to memory of 2136 2196 a93f49cdecf6e3a1002286682f19a3a5.exe 28 PID 2196 wrote to memory of 2136 2196 a93f49cdecf6e3a1002286682f19a3a5.exe 28 PID 2196 wrote to memory of 2136 2196 a93f49cdecf6e3a1002286682f19a3a5.exe 28 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14 PID 2136 wrote to memory of 2196 2136 zeabei.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\a93f49cdecf6e3a1002286682f19a3a5.exe"C:\Users\Admin\AppData\Local\Temp\a93f49cdecf6e3a1002286682f19a3a5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\zeabei.exe"C:\Users\Admin\zeabei.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD55b00c4b808789439c9b62eec1ebb1781
SHA148b7e29db130e9e44fb9f88d75f8c1c965cfd07e
SHA256b22765e5ce245c3ce896f71a52a0f9342dcf7dc8de8f272d2a331b01aec273fa
SHA5127c1aef66bc3ac797b02be7898abcc0c21da0592b9337f1e76a0853f0a84214caf4837f643f0a08a62e60dd4a941d5de0a40f6f5162d1c31e6584671396df883b