Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 07:03 UTC
Static task
static1
Behavioral task
behavioral1
Sample
88dec62330d975d6d91a031ac5933768.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
88dec62330d975d6d91a031ac5933768.exe
Resource
win10v2004-20231222-en
General
-
Target
88dec62330d975d6d91a031ac5933768.exe
-
Size
88KB
-
MD5
88dec62330d975d6d91a031ac5933768
-
SHA1
71844309956a65e7d0065253bf1ae0d28104c303
-
SHA256
d48283abdd98ec1309c77f1bc7b6e4fb809e4aee822fcf850c644c1f3738924f
-
SHA512
cbdf7f2db7a6c6a4fdbf2684a4f20656c481c331c5775bea2a7d66d4086d9827ce08c54b2f742f84e01c269f9179c93915c38995ea6ceadf2c326ad57c2c2230
-
SSDEEP
1536:MocTCULyBgrLswwWGaWbWbobSbVbBbvJ1SmHZx9k1nKw7N8za:9cTCU1rv51Iq+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miouwop.exe -
Executes dropped EXE 1 IoCs
pid Process 1864 miouwop.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 88dec62330d975d6d91a031ac5933768.exe 2076 88dec62330d975d6d91a031ac5933768.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /u" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /J" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /N" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /t" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /L" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /A" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /y" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /s" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /p" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /i" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /m" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /j" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /S" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /Z" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /E" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /c" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /O" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /l" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /o" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /r" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /k" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /R" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /d" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /g" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /K" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /B" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /q" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /Q" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /n" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /G" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /F" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /e" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /C" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /Y" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /H" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /h" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /z" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /a" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /I" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /V" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /W" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /v" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /D" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /M" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /b" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /P" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /w" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /X" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /x" miouwop.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\miouwop = "C:\\Users\\Admin\\miouwop.exe /f" miouwop.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe 1864 miouwop.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2076 88dec62330d975d6d91a031ac5933768.exe 1864 miouwop.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1864 2076 88dec62330d975d6d91a031ac5933768.exe 28 PID 2076 wrote to memory of 1864 2076 88dec62330d975d6d91a031ac5933768.exe 28 PID 2076 wrote to memory of 1864 2076 88dec62330d975d6d91a031ac5933768.exe 28 PID 2076 wrote to memory of 1864 2076 88dec62330d975d6d91a031ac5933768.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\88dec62330d975d6d91a031ac5933768.exe"C:\Users\Admin\AppData\Local\Temp\88dec62330d975d6d91a031ac5933768.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\miouwop.exe"C:\Users\Admin\miouwop.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
-
Remote address:8.8.8.8:53Requestns1.player1253.comIN AResponse
-
Remote address:8.8.8.8:53Requestns1.videoall.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.mediashares.orgIN AResponsens1.mediashares.orgIN A104.155.138.21ns1.mediashares.orgIN A107.178.223.183
-
64 B 137 B 1 1
DNS Request
ns1.player1253.com
-
62 B 135 B 1 1
DNS Request
ns1.videoall.net
-
65 B 97 B 1 1
DNS Request
ns1.mediashares.org
DNS Response
104.155.138.21107.178.223.183
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD574cbc27e5749913f55ce066851c266a5
SHA163d350ea46fed8c499e84c6b8261ff6b336e0a48
SHA2567fc137d6ff13ab1a77f6facf3bd80921b7a2bac45a63ef186fa0af32ebe299ec
SHA512a0e8fac78b186b3f1c37f7c1b277e6c70e535bb6368e6c1174d4bebfacdaeb58a3629d5d217aa3c3e3bbfb0260b93a40e0034389de21d1f5ac4e5faac9456225