Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
3c52f11c85d435cd9524e69108e2c0aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c52f11c85d435cd9524e69108e2c0aa.exe
Resource
win10v2004-20231215-en
General
-
Target
3c52f11c85d435cd9524e69108e2c0aa.exe
-
Size
204KB
-
MD5
3c52f11c85d435cd9524e69108e2c0aa
-
SHA1
a6ae49b54f17477341438226651b140db0224ddd
-
SHA256
3f09d8d557df70884689de44ca9ce291d8d037e0136e2be3ea7a236cd52d339f
-
SHA512
0eccb09d52f738834eb0236b2cd0ea4a417d083fccbc694d9188643955ff0ce40387ca7a25af17130fcc15d1e5ab407ddf9a33d9ef8317d9c1dd22628c83998d
-
SSDEEP
3072:mmqW8e0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWcx:B/h4QxL7B9W0c1RCzR/fSmlX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3c52f11c85d435cd9524e69108e2c0aa.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reiqaa.exe -
Executes dropped EXE 1 IoCs
pid Process 2456 reiqaa.exe -
Loads dropped DLL 2 IoCs
pid Process 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 2288 3c52f11c85d435cd9524e69108e2c0aa.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /s" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /w" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /h" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /n" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /e" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /e" 3c52f11c85d435cd9524e69108e2c0aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /m" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /z" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /f" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /y" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /o" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /d" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /x" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /j" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /k" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /g" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /u" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /q" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /a" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /p" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /l" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /t" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /b" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /v" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /r" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /i" reiqaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\reiqaa = "C:\\Users\\Admin\\reiqaa.exe /c" reiqaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe 2456 reiqaa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 2456 reiqaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2456 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 28 PID 2288 wrote to memory of 2456 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 28 PID 2288 wrote to memory of 2456 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 28 PID 2288 wrote to memory of 2456 2288 3c52f11c85d435cd9524e69108e2c0aa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c52f11c85d435cd9524e69108e2c0aa.exe"C:\Users\Admin\AppData\Local\Temp\3c52f11c85d435cd9524e69108e2c0aa.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\reiqaa.exe"C:\Users\Admin\reiqaa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD58a26f944ab89a793fa31a239296cc314
SHA17196d9e1789736a08babee2f1de4c641fdd28ab2
SHA256a733ba112b3be835da6fe1a800b5bce8d6b97f3fcdc76f2550e9cc3adf8b96dd
SHA512ef8741fc70e2710791c6227897b360067def4c1e80d28389a5cbb84749930b321e0980f9e7c1a273ca428f76e367abde8dd3dfd7244cc4346eb839a03fc9448b