Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
e0a6b67efc46d59f53431cc16bb5e01a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e0a6b67efc46d59f53431cc16bb5e01a.exe
Resource
win10v2004-20240226-en
General
-
Target
e0a6b67efc46d59f53431cc16bb5e01a.exe
-
Size
204KB
-
MD5
e0a6b67efc46d59f53431cc16bb5e01a
-
SHA1
553072ba3d4166802609b14b9fbd640e951d8497
-
SHA256
27f60b83688870bba98d9ca1726aeef34d776366d423e1e357287cd5106f1ba8
-
SHA512
e667ee110f7b45897334c0dcf432602afde7b1698ce40375652f1e33053180ba54d988d1db0f14704f58e5e842627b7482eac0fead0569a74bb0618b383ff181
-
SSDEEP
1536:Vq+OojHo1vzxHwxyTxNy3tQ9CW5EZWHakMwP9W6uXNh9h1AWa11GBPIdRONd+w6a:3Ho1rT0tQ9nLHbB9WTk9+JgqmlHUv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e0a6b67efc46d59f53431cc16bb5e01a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teouy.exe -
Executes dropped EXE 1 IoCs
pid Process 2988 teouy.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /j" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /o" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /e" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /t" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /i" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /v" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /k" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /a" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /h" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /s" e0a6b67efc46d59f53431cc16bb5e01a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /d" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /b" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /m" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /q" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /g" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /n" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /l" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /f" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /z" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /s" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /x" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /y" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /r" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /w" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /c" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /p" teouy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\teouy = "C:\\Users\\Admin\\teouy.exe /u" teouy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe 2988 teouy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 2988 teouy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2988 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 28 PID 3040 wrote to memory of 2988 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 28 PID 3040 wrote to memory of 2988 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 28 PID 3040 wrote to memory of 2988 3040 e0a6b67efc46d59f53431cc16bb5e01a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0a6b67efc46d59f53431cc16bb5e01a.exe"C:\Users\Admin\AppData\Local\Temp\e0a6b67efc46d59f53431cc16bb5e01a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\teouy.exe"C:\Users\Admin\teouy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5fd45f1340a9d231e2482b2fb21387e1e
SHA117f50b24c3c256cae8dbbd5fdb1d792e29ccbce3
SHA256e1d0c39e3bdac3412529deeb6cc06c19c9f0818b248f86bb0319a024e4cd3e5b
SHA5123b6917611185401a2254975cc408202d04633ef2379c1012521c520c6a8d8551dac88b02d67bdee5381cbb354310ba979b49f5c9be973dea5a5a837e8740ace2