Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
46e2a44ad003b73fe87e8273949b3ac2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46e2a44ad003b73fe87e8273949b3ac2.exe
Resource
win10v2004-20231215-en
General
-
Target
46e2a44ad003b73fe87e8273949b3ac2.exe
-
Size
248KB
-
MD5
46e2a44ad003b73fe87e8273949b3ac2
-
SHA1
9d6fe19cce46e6cf9c3acf1dddfc1147d50a1755
-
SHA256
34e723d04cad4e6566454837ca5e950e32166a5ba8f06aca5e38efac6aca494e
-
SHA512
8db160607f91ebbce63ec675e467a2cf68ddce901f0c7c75b9c70d119bd298d12738423f44f9ae6b77c99dd8979ff0f885b0b3df97c524cc57cf5c9166135efc
-
SSDEEP
3072:+R4z/dJvRDFD1yPBYEmaHtGG2gqZ+/9A+JRjKY5Md41gfy27:PJh1yPptGG2gqZ+FfKqDsX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kauyo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 46e2a44ad003b73fe87e8273949b3ac2.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 kauyo.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 2032 46e2a44ad003b73fe87e8273949b3ac2.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /g" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /p" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /h" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /o" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /s" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /Q" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /N" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /V" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /X" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /S" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /j" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /l" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /c" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /a" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /C" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /F" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /R" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /T" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /u" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /t" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /P" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /K" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /O" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /w" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /A" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /E" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /G" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /B" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /W" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /M" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /H" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /D" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /z" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /b" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /e" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /f" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /U" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /Z" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /j" 46e2a44ad003b73fe87e8273949b3ac2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /y" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /k" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /J" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /n" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /r" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /d" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /I" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /i" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /v" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /m" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /L" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /x" kauyo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\kauyo = "C:\\Users\\Admin\\kauyo.exe /Y" kauyo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe 2852 kauyo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 2852 kauyo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2852 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 28 PID 2032 wrote to memory of 2852 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 28 PID 2032 wrote to memory of 2852 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 28 PID 2032 wrote to memory of 2852 2032 46e2a44ad003b73fe87e8273949b3ac2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e2a44ad003b73fe87e8273949b3ac2.exe"C:\Users\Admin\AppData\Local\Temp\46e2a44ad003b73fe87e8273949b3ac2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\kauyo.exe"C:\Users\Admin\kauyo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5d31448b1784213d12acdc29c75ed69bb
SHA15eb431ef036aeb2c5e642f24a494ed7e135777d9
SHA2562018b8411c8012169744003fa32b7a11a74da69bcc5875586558f536c535cb2a
SHA512e484e2a30e47e80bea2a06aaf953a3861c9a6e0c2b3bd16c55be028666fa3b992cc678061e6202013ac29a1684e058d7088be2eafa266986e109421fc2f70428