Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe
Resource
win10v2004-20240226-en
General
-
Target
00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe
-
Size
60KB
-
MD5
5ba21d7f47952a19c8c596bc733b9417
-
SHA1
32961d73a35c54bcf77187d15a2ee8c6c243e3e7
-
SHA256
00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b
-
SHA512
ad5ccf79e6f610bbe5771a503a16b6e4eb3513a6d447fe8b1362af5948ae00d5054fee273498ba441a523f3ff1dcbce3aeae816a673c6c9bc7f2f7d5d0f586b4
-
SSDEEP
1536:P2GQy5euj8SC90NMO2tFSwPuQ+BEXgHT:P2Vy9Zp+wH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xaagut.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 xaagut.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /v" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /e" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /n" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /p" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /J" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /Y" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /R" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /t" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /G" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /H" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /K" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /U" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /C" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /S" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /Q" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /B" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /a" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /l" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /o" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /d" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /E" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /W" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /y" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /b" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /w" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /M" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /f" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /X" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /j" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /x" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /h" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /T" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /I" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /V" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /z" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /N" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /k" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /Z" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /L" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /D" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /F" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /q" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /A" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /c" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /r" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /g" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /m" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /u" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /O" xaagut.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xaagut = "C:\\Users\\Admin\\xaagut.exe /P" xaagut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe 4916 xaagut.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe 4916 xaagut.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4916 1664 00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe 93 PID 1664 wrote to memory of 4916 1664 00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe 93 PID 1664 wrote to memory of 4916 1664 00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe 93 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88 PID 4916 wrote to memory of 1664 4916 xaagut.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe"C:\Users\Admin\AppData\Local\Temp\00b911d5803b38fcecb8445ba698fa31c8f3c40ca16ddb5fcf71e7df0fce755b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\xaagut.exe"C:\Users\Admin\xaagut.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5322889a75b26b7047c39bab1a6ebd1ba
SHA1ee56657dbfbf5f4b576d6348ea8e8e40ba8f1597
SHA25652c4febe7745122b19b8f5facd3e77ad955320eea6d15a300589376c20f37447
SHA512a8e7cc136dca3e7b722ea9434f9bac19154153c84822501722e1eecee6023d399b5d6aff7cbd757c51328e149ff16eaf52b23cd2915ed083e369758dafddb9a7