Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
5c27a6dccc8b52f62ceaf960aa49517f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c27a6dccc8b52f62ceaf960aa49517f.exe
Resource
win10v2004-20231215-en
General
-
Target
5c27a6dccc8b52f62ceaf960aa49517f.exe
-
Size
135KB
-
MD5
5c27a6dccc8b52f62ceaf960aa49517f
-
SHA1
98d9da5cd787f7f2f3af6ad00df1cbf9e4d61a16
-
SHA256
d85d5411788893548814455de2d2a4d4b261681722bde12ab4a073734d79b580
-
SHA512
fffd9e752d705f4bd9eb89909e0a591ace4ef13d93f775ca340a1cb6591a9191e74b0304a5b6873ff2e455d75078008f91d8d48a9be95d44bf4e42c4875977dd
-
SSDEEP
3072:2EG2G/pSTW6UPb1WpXVxAaGBvbNvNbNJkvmhyPQbaDTUXGIDbwKDqCtrwdAxaVTi:hPypSTAoIDbByGPMsMP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ziwut.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 5c27a6dccc8b52f62ceaf960aa49517f.exe -
Executes dropped EXE 1 IoCs
pid Process 552 ziwut.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ziwut = "C:\\Users\\Admin\\ziwut.exe" ziwut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe 552 ziwut.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4752 5c27a6dccc8b52f62ceaf960aa49517f.exe 552 ziwut.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 552 4752 5c27a6dccc8b52f62ceaf960aa49517f.exe 92 PID 4752 wrote to memory of 552 4752 5c27a6dccc8b52f62ceaf960aa49517f.exe 92 PID 4752 wrote to memory of 552 4752 5c27a6dccc8b52f62ceaf960aa49517f.exe 92 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84 PID 552 wrote to memory of 4752 552 ziwut.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c27a6dccc8b52f62ceaf960aa49517f.exe"C:\Users\Admin\AppData\Local\Temp\5c27a6dccc8b52f62ceaf960aa49517f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\ziwut.exe"C:\Users\Admin\ziwut.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5ee19e8a68a166408e144c96c37f9cf5e
SHA184c804700ff9de86e34e887298c384f11792361c
SHA2568e2c3b96b63949a327d7345e70b86a68e64319d46469eba484d9428ff78b1d48
SHA5124f11edeb50909485c1750fc92aeac3b55570cc738b4161a7b7d74321a31769a49776ce2740273f748c62a7b59168d52e4b66f6420ab666a498700e2d3e1f91bc