Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
12d6326f0ba97c6bb9e5d63db15c81b8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12d6326f0ba97c6bb9e5d63db15c81b8.exe
Resource
win10v2004-20231215-en
General
-
Target
12d6326f0ba97c6bb9e5d63db15c81b8.exe
-
Size
232KB
-
MD5
12d6326f0ba97c6bb9e5d63db15c81b8
-
SHA1
131f622ca4b5b6170343ac449ce61656837e2ca8
-
SHA256
55ff7004fcfe3be2ead8eac697d35b38cecc3054517ae17c62425d9807ecb917
-
SHA512
e15dad040171aac0b8a5d436056c602c2e8eda22fdd182cea38685aef1236aa0101a09a76e6180f5e6d1eb9fcfaa00f40d622d261bc4e2d5b830e978f71da18c
-
SSDEEP
6144:kVcgVpXADylVl85IwwiXeujvWBxD2dMp/FFc8pZff:+ceXADylVl85IwwiXeujvWBxD2dO/F5t
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 12d6326f0ba97c6bb9e5d63db15c81b8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cauobuh.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 cauobuh.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /Z" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /i" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /r" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /d" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /Y" 12d6326f0ba97c6bb9e5d63db15c81b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /t" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /c" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /F" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /R" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /G" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /m" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /B" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /K" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /A" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /b" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /e" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /D" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /H" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /W" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /p" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /V" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /u" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /M" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /y" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /l" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /J" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /Y" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /z" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /T" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /n" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /I" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /N" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /q" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /O" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /x" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /P" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /w" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /s" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /g" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /h" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /C" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /o" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /j" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /X" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /a" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /E" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /v" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /f" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /k" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /L" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /U" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /S" cauobuh.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\cauobuh = "C:\\Users\\Admin\\cauobuh.exe /Q" cauobuh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe 3060 cauobuh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 3060 cauobuh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 3060 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 28 PID 1872 wrote to memory of 3060 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 28 PID 1872 wrote to memory of 3060 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 28 PID 1872 wrote to memory of 3060 1872 12d6326f0ba97c6bb9e5d63db15c81b8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d6326f0ba97c6bb9e5d63db15c81b8.exe"C:\Users\Admin\AppData\Local\Temp\12d6326f0ba97c6bb9e5d63db15c81b8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\cauobuh.exe"C:\Users\Admin\cauobuh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD51221dc1c9417e078063c3da3d2245286
SHA12dafab48e3c733b7f1b4609dd6ff74f0abfc49c3
SHA25648e76f0d90330e23d296223490dbcbf72605a11702bcc8bc7db6bbf2d28c0b8b
SHA51274dacb593a8afcca18e27d5f1f0fb46dae413a5382d2029e83c1c15c7180be802561d05753cf2440258961b26cd2029bfd77f533dbaa7c9d1a5466ba48ba8db3
-
Filesize
151KB
MD5c61e3c7d271194cd215d6a521bc9d6e6
SHA134d8e8d16e585617c334ad7c7d639c1f1e3ad9ab
SHA2563e7bf8717150c65ebf731a0ae07a1dd76b0f157db84ce6a460278c07feae33ab
SHA512100f99c0020628fa89f777bdfb69b22ac84d94d010b47593262b5c678632c891f2dcedc7f17aec8b68f08208de397d38a162075f7cd0b1061331abe8e8eafacc
-
Filesize
177KB
MD58b19ca826ff9d860877008a680197191
SHA17eee535ae815b815e4b55e85cf10a54c846c88d9
SHA2562293fbb32cb57fe357d704f6e02d1d0507ba2d4aa8a98c908141bb8d00d0f60d
SHA512e4f94dfaee46ca1ce95fefeafbf41655109ee3d7a556becad47a50a9dea4cf954ad1f324df47e12314178af765e44a98187b4d3e987e36d130b0919e5df60926