Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
4757bfc0ca2cf9c44700dc7c62d9f361.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4757bfc0ca2cf9c44700dc7c62d9f361.exe
Resource
win10v2004-20231215-en
General
-
Target
4757bfc0ca2cf9c44700dc7c62d9f361.exe
-
Size
312KB
-
MD5
4757bfc0ca2cf9c44700dc7c62d9f361
-
SHA1
951099744888460018f1fdf738e43f5ee3dffcf2
-
SHA256
55b0000c25f39aea4b6750bc0c9db591d0f83b13f788a506460ab3a3a2cac44e
-
SHA512
99de2eb68ff103833de95a5d98e6e976dafc60dd1d45bf1272f607011b846d86f6b88461bd51d99dd934e55987fc016ae60c020d00bd552bef3a5d1791ad3976
-
SSDEEP
6144:8KkafWxJYw4xusHwsY0sQenWuPxnyXX7:9fWxJIAsQsY0+R
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4757bfc0ca2cf9c44700dc7c62d9f361.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" meibea.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 4757bfc0ca2cf9c44700dc7c62d9f361.exe -
Executes dropped EXE 1 IoCs
pid Process 4600 meibea.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /t" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /u" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /r" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /p" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /w" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /y" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /j" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /c" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /m" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /z" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /e" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /v" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /o" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /h" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /x" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /n" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /g" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /l" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /q" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /u" 4757bfc0ca2cf9c44700dc7c62d9f361.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /a" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /i" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /s" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /k" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /d" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /f" meibea.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\meibea = "C:\\Users\\Admin\\meibea.exe /b" meibea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 4757bfc0ca2cf9c44700dc7c62d9f361.exe 2044 4757bfc0ca2cf9c44700dc7c62d9f361.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe 4600 meibea.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2044 4757bfc0ca2cf9c44700dc7c62d9f361.exe 4600 meibea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 4600 2044 4757bfc0ca2cf9c44700dc7c62d9f361.exe 94 PID 2044 wrote to memory of 4600 2044 4757bfc0ca2cf9c44700dc7c62d9f361.exe 94 PID 2044 wrote to memory of 4600 2044 4757bfc0ca2cf9c44700dc7c62d9f361.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4757bfc0ca2cf9c44700dc7c62d9f361.exe"C:\Users\Admin\AppData\Local\Temp\4757bfc0ca2cf9c44700dc7c62d9f361.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\meibea.exe"C:\Users\Admin\meibea.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD53d0f59483077691b5ab81193b6cba3d8
SHA1de1fec72f9805f5e94715f0b9edccfaa23af6faf
SHA2565271595499bbbbb2dfb7297f0d42548c2402f208eef830d525c89f6f47abd3d8
SHA51200b71d152d660f470638c5291230326716124d1ff337dd10f38fb8df4536fb99bd3ead06587830d6d51f54c0fd6fe2d2a0bfc3e554ace1048d31443571ee5f71