Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 21:08 UTC
Static task
static1
Behavioral task
behavioral1
Sample
633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe
Resource
win10v2004-20240226-en
General
-
Target
633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe
-
Size
204KB
-
MD5
6110a0cbdc987136491a76bc64a5f9eb
-
SHA1
a344c9a4074593b13df9f897b26404a75058e4af
-
SHA256
633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d
-
SHA512
827cb748a078821bbf4bd40bab2a1b7377e0c180e59bc72e69ca068c26c07a88ac581eeb6657b6a9e818308b67fbc1d9e9e2f9dedb1aa41c24a569dfd9f014b7
-
SSDEEP
3072:dmDW8E0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWwO:kyD4QxL7B9W0c1RCzR/fSmls
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zuoqo.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 zuoqo.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /q" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /a" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /y" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /e" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /h" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /m" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /d" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /b" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /v" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /z" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /f" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /x" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /t" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /b" 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /s" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /p" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /j" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /o" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /i" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /n" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /l" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /k" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /c" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /w" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /g" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /r" zuoqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuoqo = "C:\\Users\\Admin\\zuoqo.exe /u" zuoqo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe 2708 zuoqo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 2708 zuoqo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2708 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 28 PID 2804 wrote to memory of 2708 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 28 PID 2804 wrote to memory of 2708 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 28 PID 2804 wrote to memory of 2708 2804 633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe"C:\Users\Admin\AppData\Local\Temp\633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\zuoqo.exe"C:\Users\Admin\zuoqo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
-
Remote address:8.8.8.8:53Requestns1.spansearcher.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.spinsearcher.orgIN AResponse
-
Remote address:8.8.8.8:53Requestns1.player1352.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.player1352.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.player1352.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.player1352.netIN AResponse
-
Remote address:8.8.8.8:53Requestns1.player1352.orgIN AResponse
-
8.8.8.8:53ns1.spansearcher.netdns633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe66 B 139 B 1 1
DNS Request
ns1.spansearcher.net
-
8.8.8.8:53ns1.spinsearcher.orgdns633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe66 B 148 B 1 1
DNS Request
ns1.spinsearcher.org
-
8.8.8.8:53ns1.player1352.netdns633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe256 B 256 B 4 4
DNS Request
ns1.player1352.net
DNS Request
ns1.player1352.net
DNS Request
ns1.player1352.net
DNS Request
ns1.player1352.net
-
8.8.8.8:53ns1.player1352.orgdns633ae82d3d1ef159d16cc8bb5fcf43b78d540a6911927807377874a5d4fa307d.exe64 B 146 B 1 1
DNS Request
ns1.player1352.org
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5a73e81345c71a7f79ee66087bf599d2f
SHA11b4fd7397576b56afabb62c8f0918be37b227fb8
SHA256ee36455c288d64e1787d91df0424bb403b165f44b0d01e0cd144292110a2ed6d
SHA5125494c446ae8a66d302768ebd6f5783dc344518c353d778208b7acec6a41816561860ab6ad949712e0e45da11758adb96b4d9b5e3359db6e06e0fb8670bfc5e9f