Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
3e89c8589d66f39ae87054b415d42bbb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e89c8589d66f39ae87054b415d42bbb.exe
Resource
win10v2004-20231215-en
General
-
Target
3e89c8589d66f39ae87054b415d42bbb.exe
-
Size
316KB
-
MD5
3e89c8589d66f39ae87054b415d42bbb
-
SHA1
a23510bd3cceb53e569dfcb2d0112fea0e3555df
-
SHA256
b7862ffdcd2897865701aa8a29cf374a957e0a0cf954ec6fcbf84c11719fee70
-
SHA512
21e44defbbd14a50ce635dab58ab6984cd9c4f4ccdc2663543a41485d2eeb134dedc4a3b14581527cbcf810deaab79f0787ad6e24b843707933a0617537f4d76
-
SSDEEP
3072:k4OzU5gn/OdmLGeCfcpwA5f3CEoEtUMbfT:VOzvOK7cKiED5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuofe.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 xuofe.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 3e89c8589d66f39ae87054b415d42bbb.exe 2136 3e89c8589d66f39ae87054b415d42bbb.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /h" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /j" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /M" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /G" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /E" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /J" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /K" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /q" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /s" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /o" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /Q" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /I" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /Z" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /y" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /n" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /H" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /O" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /W" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /X" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /u" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /t" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /T" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /v" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /x" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /D" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /k" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /V" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /B" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /z" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /A" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /i" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /c" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /Y" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /b" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /L" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /r" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /f" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /l" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /e" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /C" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /U" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /g" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /a" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /d" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /m" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /R" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /F" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /P" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /S" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /N" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /p" xuofe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\xuofe = "C:\\Users\\Admin\\xuofe.exe /w" xuofe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe 2788 xuofe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 3e89c8589d66f39ae87054b415d42bbb.exe 2788 xuofe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2788 2136 3e89c8589d66f39ae87054b415d42bbb.exe 28 PID 2136 wrote to memory of 2788 2136 3e89c8589d66f39ae87054b415d42bbb.exe 28 PID 2136 wrote to memory of 2788 2136 3e89c8589d66f39ae87054b415d42bbb.exe 28 PID 2136 wrote to memory of 2788 2136 3e89c8589d66f39ae87054b415d42bbb.exe 28 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1 PID 2788 wrote to memory of 2136 2788 xuofe.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e89c8589d66f39ae87054b415d42bbb.exe"C:\Users\Admin\AppData\Local\Temp\3e89c8589d66f39ae87054b415d42bbb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\xuofe.exe"C:\Users\Admin\xuofe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD52c00d4b23909659a51be1373c56493ee
SHA17d706bdda58c50dc1720daafa60917d30e75f19c
SHA256a310ceefe868bffeef17515cd93156fd6c01e07b96eeb38ddeebd5ebd33acf69
SHA512f9f3913e683983882e67d743c3f4b8c4b3350b4bceb5cc208a2989e04e0be21a8c593cb415a75bf7f301731d5c71aad5af367d38d3aa206eb4bda95651618c24