Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
711f879bd56173691f22859195e0581b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
711f879bd56173691f22859195e0581b.exe
Resource
win10v2004-20231215-en
General
-
Target
711f879bd56173691f22859195e0581b.exe
-
Size
80KB
-
MD5
711f879bd56173691f22859195e0581b
-
SHA1
f7dbaa37c5df8fa93dc4c524ab60bad97689a9b0
-
SHA256
526d659f698077d5f6082872b74b5f4b328ee284a3ca406ff8cabc5a74c933bd
-
SHA512
84708b3debddd9f341dd31773d85b0c16df8082933551b9d23b1caa89270f0bb9f9e908dc05ec03f43e8d8f9b52acd123926eb47a57888b542f774d35da414d5
-
SSDEEP
1536:vQ7wLYvKGlTGQxguIxZTAwlpwFJ0T72mocT:4oYvrKxZfUFJ0T72mBT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 711f879bd56173691f22859195e0581b.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zoeriob.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 711f879bd56173691f22859195e0581b.exe -
Executes dropped EXE 1 IoCs
pid Process 4432 zoeriob.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /n" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /v" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /p" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /l" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /d" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /m" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /s" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /j" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /o" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /g" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /t" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /i" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /q" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /x" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /h" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /w" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /e" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /k" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /z" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /b" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /a" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /y" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /u" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /c" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /w" 711f879bd56173691f22859195e0581b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /r" zoeriob.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoeriob = "C:\\Users\\Admin\\zoeriob.exe /f" zoeriob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1212 711f879bd56173691f22859195e0581b.exe 1212 711f879bd56173691f22859195e0581b.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe 4432 zoeriob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1212 711f879bd56173691f22859195e0581b.exe 4432 zoeriob.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1212 wrote to memory of 4432 1212 711f879bd56173691f22859195e0581b.exe 93 PID 1212 wrote to memory of 4432 1212 711f879bd56173691f22859195e0581b.exe 93 PID 1212 wrote to memory of 4432 1212 711f879bd56173691f22859195e0581b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\711f879bd56173691f22859195e0581b.exe"C:\Users\Admin\AppData\Local\Temp\711f879bd56173691f22859195e0581b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\zoeriob.exe"C:\Users\Admin\zoeriob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD582307436ca35d7ce0bbb2e76d691de49
SHA11fdc717e51b9dbbeec4e4b20aa463084dee9801b
SHA2562377ed85db2012e7219d5693808a2a10e14a89a21e3f7ff3f7f03c3783b093aa
SHA512f51f3bdce976406e50908d9e8165b9dac092de0d5a7a50f627ca288c339034a6c01adbfe6701574ad3330fbc9f7f6aad725aa76d79d00c5a4a13c91dba0431d7