Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe
Resource
win10v2004-20231222-en
General
-
Target
4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe
-
Size
248KB
-
MD5
4bccbcbd9afdc5a5414bb4e3a5baf9c6
-
SHA1
2701ffd37a285dd99d7f2f7e6f040e9c31124d91
-
SHA256
9d74a521cf853fcecfca10f501c7b88ebe5a11434722ebae15d9a33121152e8a
-
SHA512
bc50ac763159f2e801fe3f31cc3f4c976f639beba2ceda90dee0a086ec26f9ed211fbaf53496605e5eaab0dbe21cbfc7c20641f6ba1fd8fcc1f9c3fba7053d2a
-
SSDEEP
1536:S+gu3c9YnLmU9tlk81NM6MoAUK1bWYxYZ8Q6iwkSQ7A/XZKl/YWAISDKowoz/GHg:Fgu3klUPlk83AzxYkijDcdeD4x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teauwol.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe -
Executes dropped EXE 1 IoCs
pid Process 4876 teauwol.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /H" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /l" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /y" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /K" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /Z" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /Q" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /B" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /o" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /a" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /x" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /V" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /t" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /I" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /r" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /D" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /f" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /Y" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /C" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /O" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /A" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /e" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /P" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /g" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /k" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /T" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /v" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /d" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /p" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /c" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /u" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /h" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /j" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /m" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /q" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /L" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /s" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /z" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /b" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /S" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /R" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /N" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /G" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /i" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /n" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /E" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /M" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /X" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /U" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /J" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /w" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /F" teauwol.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teauwol = "C:\\Users\\Admin\\teauwol.exe /W" teauwol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe 4876 teauwol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4696 4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe 4876 teauwol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4876 4696 4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe 91 PID 4696 wrote to memory of 4876 4696 4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe 91 PID 4696 wrote to memory of 4876 4696 4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe 91 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40 PID 4876 wrote to memory of 4696 4876 teauwol.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe"C:\Users\Admin\AppData\Local\Temp\4bccbcbd9afdc5a5414bb4e3a5baf9c6.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\teauwol.exe"C:\Users\Admin\teauwol.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5573298914e1f36bdae66c6d41f2805e3
SHA1c51690326d5e5440874e0608870074c7f96a4bd0
SHA256975d4c698e86e57c1fa94d0a0405a495085c0e65084ff2f1a12392b82ec135c8
SHA5127c1843aafc9dc4a3f82d354b54da326b4380d115974b2d4e8d347c72663ff41d58c38f7a3412c7af0c3f06a09945e0f6e41285ff52ac04e348bcb21027fbcbbb