Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
0399bec4f88115dca81b3e97a46e8a38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0399bec4f88115dca81b3e97a46e8a38.exe
Resource
win10v2004-20231215-en
General
-
Target
0399bec4f88115dca81b3e97a46e8a38.exe
-
Size
200KB
-
MD5
0399bec4f88115dca81b3e97a46e8a38
-
SHA1
66430ce41f37ce136e0ddc30a7ee0fe29bed31c3
-
SHA256
90949e070ad62d50b215f3d9392a83864708bee6cc88379f121a1a2280d26c8d
-
SHA512
43c9472b4ca86b9935cecf98cacd71de0e94fea879d934eecbbed0f6fabef64085603c0b469d97ae19487ca86deed28e9273292b92b67ccf2ba277d1195138d8
-
SSDEEP
6144:28Q7Knvmb7/D26rfo9Am26fBXMZ8R3FXjrCTYTQdq4qJUGQBSpYCbwmB:DQ7Knvmb7/D26zZ8R3FXjrC8T8q4qJgG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0399bec4f88115dca81b3e97a46e8a38.exe Set value (int) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xealaoh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 0399bec4f88115dca81b3e97a46e8a38.exe -
Executes dropped EXE 1 IoCs
pid Process 4552 xealaoh.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /U" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /S" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /h" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /T" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /f" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /q" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /L" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /C" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /l" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /D" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /t" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /W" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /b" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /R" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /B" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /O" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /g" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /a" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /G" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /I" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /V" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /o" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /e" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /w" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /u" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /k" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /d" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /r" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /F" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /E" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /J" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /H" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /M" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /Q" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /X" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /p" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /A" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /Z" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /m" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /i" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /Y" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /p" 0399bec4f88115dca81b3e97a46e8a38.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /P" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /z" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /K" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /v" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /j" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /n" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /s" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /x" xealaoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xealaoh = "C:\\Users\\Admin\\xealaoh.exe /N" xealaoh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4124 0399bec4f88115dca81b3e97a46e8a38.exe 4124 0399bec4f88115dca81b3e97a46e8a38.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe 4552 xealaoh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4124 0399bec4f88115dca81b3e97a46e8a38.exe 4552 xealaoh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4552 4124 0399bec4f88115dca81b3e97a46e8a38.exe 95 PID 4124 wrote to memory of 4552 4124 0399bec4f88115dca81b3e97a46e8a38.exe 95 PID 4124 wrote to memory of 4552 4124 0399bec4f88115dca81b3e97a46e8a38.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0399bec4f88115dca81b3e97a46e8a38.exe"C:\Users\Admin\AppData\Local\Temp\0399bec4f88115dca81b3e97a46e8a38.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\xealaoh.exe"C:\Users\Admin\xealaoh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD54a11113f30b0b04fb18ed2aa9e7fe66a
SHA1541ddef0770b4278f1bf9bbd0b7eb8f4e7b888cf
SHA25638d2a2308684222e6954efd9a9f5869307874b571e8e811bf54e1b6cfd8cb9fb
SHA5122df9a5bc73bb0a132781e46913483d99e05f0cadf58e0c52e078ce0622b971fe9ed681c58cb71e4b39b0832eb08ff7f55e5410ebb85bce2c04565edd774fce03