Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
015fe015cf765310d7f52d7d26bd7c87.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
015fe015cf765310d7f52d7d26bd7c87.exe
Resource
win10v2004-20231215-en
General
-
Target
015fe015cf765310d7f52d7d26bd7c87.exe
-
Size
136KB
-
MD5
015fe015cf765310d7f52d7d26bd7c87
-
SHA1
0d1578c7c9d7eeeda0c06f557c2e09cb1478ae0c
-
SHA256
b8cd4f5f312fe974ebc19987368682ce4da056a4721be1c7fc30844eda124e8e
-
SHA512
18b45771ead496cadd2618df96465157b1bbc0b81d044392f3bb5b9fdcb921fbc66f7a5bbfdd32db583d20cfb6da9dbc0c97b0de2b41e2f1742b76f3848fdff8
-
SSDEEP
3072:BmQUgwjBfQn7WbIqH0ybZBiOllyEmcP82+aVdOt66VGegmN:Bm1Qn7WbIqH0ybZBiOllyE5D+aVkjseN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" siobiu.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 siobiu.exe -
Loads dropped DLL 2 IoCs
pid Process 628 015fe015cf765310d7f52d7d26bd7c87.exe 628 015fe015cf765310d7f52d7d26bd7c87.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /I" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /K" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /w" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /a" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /A" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /R" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /q" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /M" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /J" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /i" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /o" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /U" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /n" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /t" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /c" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /g" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /G" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /O" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /L" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /V" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /j" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /S" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /r" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /P" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /X" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /f" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /x" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /H" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /T" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /E" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /W" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /m" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /s" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /F" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /Y" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /C" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /h" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /Z" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /k" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /B" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /D" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /z" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /p" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /v" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /b" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /Q" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /l" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /e" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /d" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /N" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /y" siobiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\siobiu = "C:\\Users\\Admin\\siobiu.exe /u" siobiu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe 2316 siobiu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 628 015fe015cf765310d7f52d7d26bd7c87.exe 2316 siobiu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 628 wrote to memory of 2316 628 015fe015cf765310d7f52d7d26bd7c87.exe 28 PID 628 wrote to memory of 2316 628 015fe015cf765310d7f52d7d26bd7c87.exe 28 PID 628 wrote to memory of 2316 628 015fe015cf765310d7f52d7d26bd7c87.exe 28 PID 628 wrote to memory of 2316 628 015fe015cf765310d7f52d7d26bd7c87.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\015fe015cf765310d7f52d7d26bd7c87.exe"C:\Users\Admin\AppData\Local\Temp\015fe015cf765310d7f52d7d26bd7c87.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\siobiu.exe"C:\Users\Admin\siobiu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5382c5f1fba6b336882fc2aaf8cdb5993
SHA1d70b7589d12270bc953deb0a218310f61bc33254
SHA256a105a38633f4cb6bb206ff38cbfbc374d00a1c07aa7759ff250fe6c86a49d4a7
SHA5125e43e0b340c4d6a7e31565cb376920fb693d40c188c02493e84657a8d6feae3dadd3e38556ff27ce351049c1edb94c9ac9f57040dace2e4f1a81c19d71e4bf41