Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe
Resource
win10v2004-20240226-en
General
-
Target
2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe
-
Size
140KB
-
MD5
6940b461e331d93e5408d4ad13cc1c47
-
SHA1
97e9bbbda2a5b4d8de10a5832b1bb2bfaeaafdc3
-
SHA256
2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172
-
SHA512
60e7864655bf0ed894bccd5bae9077fab37d4345cc9f1c670f0d7b0ef12ea4fbd3a7b4212c634829bc45cd1eacb224177c5c977cad09227f0ba4ec417a542c17
-
SSDEEP
3072:cB3u86LSsfXUPKMX1xLZsLwXloSx60ogKn1uqRW:cBSLSsfXUPKMX1xLZsLuoE60ogKn1u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoawu.exe -
Executes dropped EXE 1 IoCs
pid Process 2908 xoawu.exe -
Loads dropped DLL 2 IoCs
pid Process 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /a" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /u" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /G" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /o" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /K" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /Y" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /j" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /P" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /q" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /S" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /M" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /T" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /E" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /p" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /R" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /w" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /Z" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /H" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /d" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /f" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /r" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /k" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /e" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /l" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /J" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /C" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /v" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /c" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /I" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /s" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /Q" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /z" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /W" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /L" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /D" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /V" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /F" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /X" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /h" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /x" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /m" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /y" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /g" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /n" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /A" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /i" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /b" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /U" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /N" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /B" xoawu.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoawu = "C:\\Users\\Admin\\xoawu.exe /t" xoawu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe 2908 xoawu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe 2908 xoawu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2908 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe 28 PID 2484 wrote to memory of 2908 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe 28 PID 2484 wrote to memory of 2908 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe 28 PID 2484 wrote to memory of 2908 2484 2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe"C:\Users\Admin\AppData\Local\Temp\2c4b25d7c963e79c7b32f1113cffc266c806329f46a5fc7b7d6537c17d360172.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\xoawu.exe"C:\Users\Admin\xoawu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD51aadc1bf75dc978ac1ac1f3cc0081b1f
SHA1a497a1d3413ea79eb3c8b3d6080b588c59c8618b
SHA2567ef18ebdd95b8374f1e8973c461ea7ec5bdfd9fcf49fd574643e693ecbfd3be0
SHA512af62d32bec3cda59d4bad159cc8b00c552fffa01c9801cf8130d9af391a9cfec9a09f0c63dd6c3374c107949e027e95e0a8ce70c5d4d6f094253fd09e0d13949