Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
062e12008afd33f39718db8a21b2128c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
062e12008afd33f39718db8a21b2128c.exe
Resource
win10v2004-20231215-en
General
-
Target
062e12008afd33f39718db8a21b2128c.exe
-
Size
292KB
-
MD5
062e12008afd33f39718db8a21b2128c
-
SHA1
4063cedbca0bc470735f458fe02dc0f6fe92a814
-
SHA256
19efe0ad042bcb1e27679f9c9b20d02106ac01c73a87593e25f7ad5d57eecea7
-
SHA512
88f81b77d260d1d6df050aeb21c4a8b648fcaad196d84b5009d0a1b41ecb0dae2bffaedb3fa6431e9dd79881bc85f4c61ea2c3cb2af2c6b959e6f1eab701fc36
-
SSDEEP
6144:tuYlw9OOaUP9VO3oTUX5K/fObT/bGilTBpSthkZ7xCrLOzpqnI3YxZkoVvdB:thlw9eUV03owX5K/fObT/bGi4hkZ7xC9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 062e12008afd33f39718db8a21b2128c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" meiuyu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 062e12008afd33f39718db8a21b2128c.exe -
Executes dropped EXE 1 IoCs
pid Process 1460 meiuyu.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /T" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /U" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /L" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /I" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /F" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /e" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /X" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /G" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /S" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /x" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /b" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /E" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /R" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /s" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /o" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /j" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /t" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /K" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /a" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /v" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /p" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /q" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /D" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /i" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /n" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /Q" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /z" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /m" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /k" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /w" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /O" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /P" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /d" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /N" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /Y" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /y" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /A" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /V" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /H" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /c" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /u" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /J" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /M" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /h" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /Z" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /W" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /l" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /C" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /g" meiuyu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meiuyu = "C:\\Users\\Admin\\meiuyu.exe /h" 062e12008afd33f39718db8a21b2128c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 216 062e12008afd33f39718db8a21b2128c.exe 216 062e12008afd33f39718db8a21b2128c.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe 1460 meiuyu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 216 062e12008afd33f39718db8a21b2128c.exe 1460 meiuyu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 1460 216 062e12008afd33f39718db8a21b2128c.exe 91 PID 216 wrote to memory of 1460 216 062e12008afd33f39718db8a21b2128c.exe 91 PID 216 wrote to memory of 1460 216 062e12008afd33f39718db8a21b2128c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\062e12008afd33f39718db8a21b2128c.exe"C:\Users\Admin\AppData\Local\Temp\062e12008afd33f39718db8a21b2128c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\meiuyu.exe"C:\Users\Admin\meiuyu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD56680fb6190f2bd46fb2c769f42c60635
SHA15421e27a7a971476737adcf465fb8df4c281be14
SHA256869ea22144a9bddafa1f57d308a5bf77b05ad593c8a469ba52fd1cca860495bb
SHA512562adb033a3f95793cb0665a353faf8c071131c9a56f843f624ea0db2568caebb40a0a62eef7d995dc23b596976b71061ec696b2ef9bac5268f37abd3a305389