Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
7f724f16e198623f22bce89fa06d8c4e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f724f16e198623f22bce89fa06d8c4e.exe
Resource
win10v2004-20231222-en
General
-
Target
7f724f16e198623f22bce89fa06d8c4e.exe
-
Size
216KB
-
MD5
7f724f16e198623f22bce89fa06d8c4e
-
SHA1
3fa152bc31516cfb650b922437862cd9ae41bc64
-
SHA256
53a8ce69fa26961c132151a90a3acf2681f4b7c9960813d9a8a41b6b83e4561e
-
SHA512
beba08f2a0e4de82e74086266060a8bd731a250e5f4a123d923ce5a847ed9f26123acab7716ea049ae8b6b631beb52ac8f992da711f4ab195ae932272da7d514
-
SSDEEP
3072:SFvdCkdoHFGFooobAqzNOEbOKZbtpGPsLxN:SFv0NPseNmKJtpLN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7f724f16e198623f22bce89fa06d8c4e.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" houjui.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 houjui.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 7f724f16e198623f22bce89fa06d8c4e.exe 2268 7f724f16e198623f22bce89fa06d8c4e.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /i" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /J" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /g" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /U" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /k" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /O" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /C" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /Z" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /D" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /j" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /F" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /y" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /a" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /A" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /m" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /c" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /B" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /e" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /Q" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /R" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /p" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /q" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /X" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /v" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /L" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /V" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /K" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /T" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /n" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /W" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /t" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /P" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /H" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /G" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /d" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /M" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /h" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /I" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /N" 7f724f16e198623f22bce89fa06d8c4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /N" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /Y" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /r" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /z" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /s" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /S" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /b" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /w" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /l" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /f" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /o" houjui.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\houjui = "C:\\Users\\Admin\\houjui.exe /x" houjui.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 7f724f16e198623f22bce89fa06d8c4e.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe 2196 houjui.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2268 7f724f16e198623f22bce89fa06d8c4e.exe 2196 houjui.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2196 2268 7f724f16e198623f22bce89fa06d8c4e.exe 28 PID 2268 wrote to memory of 2196 2268 7f724f16e198623f22bce89fa06d8c4e.exe 28 PID 2268 wrote to memory of 2196 2268 7f724f16e198623f22bce89fa06d8c4e.exe 28 PID 2268 wrote to memory of 2196 2268 7f724f16e198623f22bce89fa06d8c4e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f724f16e198623f22bce89fa06d8c4e.exe"C:\Users\Admin\AppData\Local\Temp\7f724f16e198623f22bce89fa06d8c4e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\houjui.exe"C:\Users\Admin\houjui.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD503f716a74b6b67a9ba32a7e3c58800a7
SHA13df51cf232271711c388cdc85993ca55d4544bac
SHA256d199375362268e4623b9fadb3f46a06daf50b4d0a93aa3c84d85b9f450c2ddfd
SHA512567ab92198134d4cfa28e1536d3d72568aaa24115f3687bda4d90f09e7fa2488a59854c80ea0f1152112f1f0701a24f46b3a266a20eb35f2ee28c5068fa3b4ef