Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
16bee745e2da2e25bbcef7a9e03f3ed9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16bee745e2da2e25bbcef7a9e03f3ed9.exe
Resource
win10v2004-20231215-en
General
-
Target
16bee745e2da2e25bbcef7a9e03f3ed9.exe
-
Size
224KB
-
MD5
16bee745e2da2e25bbcef7a9e03f3ed9
-
SHA1
01772491075b9f29ed6e6244f21172e9652b801b
-
SHA256
9c589a937ba8256a7f3b94890006f439238c8e2706e2359ea58ed0993ed92682
-
SHA512
7e0da50d8931b1e39105794c2fe01db24593972d4b34710ae22259b170c6df3a2f3eb24f152ad3859b351ba4b07ee36f116eed8df83819ab303f6e3adf6ce723
-
SSDEEP
6144:jTFwzWQCYVLKv+1DvopAytt0Sh4sO0rTbJsjBv23xuUS71Xm4mqWKnvmb7/D26Da:fFwbVLKv+1DvopAyD0Sy0rTbyjw3x/Sn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 16bee745e2da2e25bbcef7a9e03f3ed9.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" puqef.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 puqef.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe -
Adds Run key to start application 2 TTPs 38 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /u" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /P" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /y" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /R" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /B" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /e" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /U" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /b" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /I" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /C" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /t" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /g" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /v" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /h" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /s" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /j" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /n" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /c" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /r" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /x" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /H" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /a" 16bee745e2da2e25bbcef7a9e03f3ed9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /z" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /J" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /D" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /E" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /X" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /T" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /a" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /o" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /S" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /M" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /Y" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /f" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /L" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /W" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /Z" puqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\puqef = "C:\\Users\\Admin\\puqef.exe /k" puqef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe 2992 puqef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 2992 puqef.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2992 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 28 PID 2392 wrote to memory of 2992 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 28 PID 2392 wrote to memory of 2992 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 28 PID 2392 wrote to memory of 2992 2392 16bee745e2da2e25bbcef7a9e03f3ed9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16bee745e2da2e25bbcef7a9e03f3ed9.exe"C:\Users\Admin\AppData\Local\Temp\16bee745e2da2e25bbcef7a9e03f3ed9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\puqef.exe"C:\Users\Admin\puqef.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ce3b5736788a6eefb09e622cb893c921
SHA1c65b07587eba14c6d6b0ceec6eeb9408de0721fd
SHA256b0ae71478bd454dbd66f126f085f16b36ae87c691773b49f19610de0f046ebf8
SHA512d11a9cc6c11e7fa979ce681cbddb71fab623509bc2ef83a4ed886087d4e02158c8b8c7f1e4d5748f9650bb72e31d6acbb956a414111ca7e37676317476fcc703