Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
54671c82326c4691f3ec3d30a26aef9b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54671c82326c4691f3ec3d30a26aef9b.exe
Resource
win10v2004-20231215-en
General
-
Target
54671c82326c4691f3ec3d30a26aef9b.exe
-
Size
260KB
-
MD5
54671c82326c4691f3ec3d30a26aef9b
-
SHA1
224b8ed4166d62172930401f6ade9a4387f15a52
-
SHA256
cab3aa574d05602045bff1c725de643ae6c35df02c5e77da135345df240d2530
-
SHA512
ae88c67baaa6ee9cbb1114c94bc2ab81bd92315eba3b3bcc27d1cf318ea70ac1b63ee0f52c881a174d6522f07fd9421e2a84fbcdd87811c68b74d7a28ba4a799
-
SSDEEP
3072:gan7QCMpHpNpTKh/o6PP9m1yIM6Q+Qs+++2o+e60O:7xMpHpNln
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haoayo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 54671c82326c4691f3ec3d30a26aef9b.exe -
Executes dropped EXE 1 IoCs
pid Process 4224 haoayo.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /O" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /W" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /G" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /k" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /U" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /m" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /w" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /p" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /Q" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /J" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /v" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /f" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /B" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /n" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /Y" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /X" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /D" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /R" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /z" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /j" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /u" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /s" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /q" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /V" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /K" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /d" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /E" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /b" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /S" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /l" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /N" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /i" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /a" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /P" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /t" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /L" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /M" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /I" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /g" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /o" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /A" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /y" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /x" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /Z" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /T" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /h" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /C" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /H" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /e" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /F" haoayo.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haoayo = "C:\\Users\\Admin\\haoayo.exe /r" haoayo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe 4224 haoayo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1360 54671c82326c4691f3ec3d30a26aef9b.exe 4224 haoayo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4224 1360 54671c82326c4691f3ec3d30a26aef9b.exe 67 PID 1360 wrote to memory of 4224 1360 54671c82326c4691f3ec3d30a26aef9b.exe 67 PID 1360 wrote to memory of 4224 1360 54671c82326c4691f3ec3d30a26aef9b.exe 67 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12 PID 4224 wrote to memory of 1360 4224 haoayo.exe 12
Processes
-
C:\Users\Admin\AppData\Local\Temp\54671c82326c4691f3ec3d30a26aef9b.exe"C:\Users\Admin\AppData\Local\Temp\54671c82326c4691f3ec3d30a26aef9b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\haoayo.exe"C:\Users\Admin\haoayo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224
-