Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
c68449aa421d417f75ed778f4c7116f4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c68449aa421d417f75ed778f4c7116f4.exe
Resource
win10v2004-20240226-en
General
-
Target
c68449aa421d417f75ed778f4c7116f4.exe
-
Size
252KB
-
MD5
c68449aa421d417f75ed778f4c7116f4
-
SHA1
187c8b44f15bc7fe1951084f59f9e1ad6397271e
-
SHA256
1ae1fc1c2de39fe189e2e2c54c328651e36af25b90aa96381c13d4aee4321235
-
SHA512
2d34991c94cd8cffcc948f7f9e6b3b32417a0b2a83970b9128496b1e683331197789401c3d55dfbd8f474c9e748a3e89552c7e34583f4f32e43dfaea82f35f25
-
SSDEEP
3072:VrAcxx7LausWvZ0OgRqTAJcLGGO/xuiEyJeOOeGs5oxnkNzQKGjX2:VrPFx/ZLA4PmG6d5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c68449aa421d417f75ed778f4c7116f4.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pjtoh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation c68449aa421d417f75ed778f4c7116f4.exe -
Executes dropped EXE 1 IoCs
pid Process 3112 pjtoh.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /n" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /E" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /B" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /Z" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /t" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /X" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /V" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /M" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /s" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /P" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /x" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /f" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /g" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /N" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /u" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /z" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /C" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /Y" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /O" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /J" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /q" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /p" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /T" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /S" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /i" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /F" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /W" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /A" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /h" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /r" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /a" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /e" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /k" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /w" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /j" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /Q" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /U" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /D" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /y" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /G" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /L" c68449aa421d417f75ed778f4c7116f4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /c" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /L" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /d" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /b" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /K" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /o" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /R" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /H" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /m" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /l" pjtoh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pjtoh = "C:\\Users\\Admin\\pjtoh.exe /I" pjtoh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 c68449aa421d417f75ed778f4c7116f4.exe 4220 c68449aa421d417f75ed778f4c7116f4.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe 3112 pjtoh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4220 c68449aa421d417f75ed778f4c7116f4.exe 3112 pjtoh.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3112 4220 c68449aa421d417f75ed778f4c7116f4.exe 94 PID 4220 wrote to memory of 3112 4220 c68449aa421d417f75ed778f4c7116f4.exe 94 PID 4220 wrote to memory of 3112 4220 c68449aa421d417f75ed778f4c7116f4.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c68449aa421d417f75ed778f4c7116f4.exe"C:\Users\Admin\AppData\Local\Temp\c68449aa421d417f75ed778f4c7116f4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\pjtoh.exe"C:\Users\Admin\pjtoh.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5376ab3c9d2667dae9b13ceff585f02e7
SHA1b73d297615649889a5d091710f9f2dcf4f4482bd
SHA256d7ead77b72a04a61c2fd6ba54bb154842fc3f7b948bf315f3a8144499521e3d8
SHA5129c6fbe2740dde35e528902ea4a647ec6e547cdc1c057a4de112473885f4b0dabd41d8db0c9125caad4cc55ac7dd9ad8a155d35fb1b8f54b117cffa6f85011d07