Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
rusik na kuhne.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
rusik na kuhne.exe
Resource
win10v2004-20231215-en
General
-
Target
rusik na kuhne.exe
-
Size
564KB
-
MD5
f44445aeb63e81045e17563a55e76f13
-
SHA1
7b5b8cba606b2d28236ae6801ca0e1be4b391455
-
SHA256
938cf550c7f4f125804d8a1d7bf9ea9ad72facedae6a01e776bff846f948e6dc
-
SHA512
3bde94299b855b57faaa2d1bb9e88ce693bbdf7a00d1849e45806e28c2d85afaa67e39f3ca774ab2993d7bc488904233745cf01321af26225c68da2e25d62b50
-
SSDEEP
12288:6pUJ3r6YkVwJgNnSykgb9cqWnw4q6ZmFhqss3MMq:6pUNr6YkVRFkgbeqeo68FhqxMM
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xqrmcmuvhab.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 xqrmcmuvhab.exe -
Loads dropped DLL 2 IoCs
pid Process 944 rusik na kuhne.exe 944 rusik na kuhne.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xqrmcmuvhab.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xqrmcmuvhab.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 whatismyipaddress.com 9 whatismyip.everdot.org 12 www.showmyipaddress.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 944 rusik na kuhne.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 944 wrote to memory of 2172 944 rusik na kuhne.exe 25 PID 944 wrote to memory of 2172 944 rusik na kuhne.exe 25 PID 944 wrote to memory of 2172 944 rusik na kuhne.exe 25 PID 944 wrote to memory of 2172 944 rusik na kuhne.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xqrmcmuvhab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xqrmcmuvhab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rusik na kuhne.exe"C:\Users\Admin\AppData\Local\Temp\rusik na kuhne.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\xqrmcmuvhab.exe"C:\Users\Admin\AppData\Local\Temp\xqrmcmuvhab.exe" "c:\users\admin\appdata\local\temp\rusik na kuhne.exe*"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System policy modification
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\ouadfn.exe"C:\Users\Admin\AppData\Local\Temp\ouadfn.exe" "-C:\Users\Admin\AppData\Local\Temp\aqgtfxqjzigekkfu.exe"3⤵PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\ouadfn.exe"C:\Users\Admin\AppData\Local\Temp\ouadfn.exe" "-C:\Users\Admin\AppData\Local\Temp\aqgtfxqjzigekkfu.exe"3⤵PID:1888
-
-
-
C:\Users\Admin\AppData\Local\Temp\xqrmcmuvhab.exe"C:\Users\Admin\AppData\Local\Temp\xqrmcmuvhab.exe" "c:\users\admin\appdata\local\temp\rusik na kuhne.exe"2⤵PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD53005f371e00fc94280c5f6ebdb0d8c5f
SHA11d0e7e04b8c4e5b389b551c6f8dc88775ea8764f
SHA256be8163763b92bb6d07d33180e452d00195919840ebaabf243d96e0783e411b03
SHA5121fe9bd8d27bd46b1d08dcee22fc9fa5f8c0093c865b1b92947c1798ba039c7471ebe89def2005119be9c9772a78475158132510323974b9483bba83d9f37f1c2
-
Filesize
280B
MD56311b2c2715e365ea21a3fac9d1416fb
SHA18a52992c4ebc94ab3c5f53707568ebb8979bb6b2
SHA256efd94c250ecbe4dbdc2a434a893450eabfb90ff0fa35104f34ca4cac1311776c
SHA512b4715b7eb368fd961be6a0f13e2d9566344f39aa9a25b368a791fb6b66a0e5aedda7723a99fca99288ef335f8d411ebd253386078c77603ec4b4e31fcf725080
-
Filesize
85KB
MD53dc4db9e80f3bc3a17768f1ed549b433
SHA13709175e016f9566ba996c5359253319f3ebc790
SHA256156f86a2967935cb64c18255c98d145a0466b31ff75b8fea0b76dc1f97e943ce
SHA5124638f63e2b2293b1cd2225b54a71288fbc9c476d40b007ec53af8e917b7f45b4f6561a35cf16d13f31a559879c4a215d197d804fda59657a90764c27b8bb8d85
-
Filesize
375KB
MD5f6fe8aca43ea998bc6fe3facd5b0ac09
SHA1a3cad09e9ac8af075da4ccd1a80d5deeffffa524
SHA256da2c1ed9408c8eb445bbdfb64e68f3b61af7a01ae98f537c22f0702c01f7e161
SHA51258b2e60de741e886f90a504fc9c5b00de008050d24f84c949fd3c766e2a47f5864099ca5341dccbcea32d8e685ab1709e65795241768733e0aeb1ab3748fa15d
-
Filesize
320KB
MD5c4a958e22d338007beecedffeb5ff421
SHA1927fcb6d0c14416839f00889191c42d8e7eb1a50
SHA25611b14cdcdf9946aeac72ea871f0d5eac805a5cdd53dd490a013536934e46fadf
SHA512a98852c16db9c4d7b33517e1b2165bfe678f17464688b40e18a8dccd6fb919372fbb14d541922a8532e1110ab0d62fbe5377935ba61ccc1d9dfe818b4e372b7a