Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
27c3da81b80c10c5041f1083d568b778.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27c3da81b80c10c5041f1083d568b778.exe
Resource
win10v2004-20240226-en
General
-
Target
27c3da81b80c10c5041f1083d568b778.exe
-
Size
48KB
-
MD5
27c3da81b80c10c5041f1083d568b778
-
SHA1
c2332153a421351275f6ba9cd3476d40d38f81b2
-
SHA256
d28e6dec073a1f9a47a3700225008096f8185095f94be2e1cd3a6b14615d590f
-
SHA512
eccc70dba76834b608b76898622fd8c9b42f2990b53d109f12987170c9ab6af79716d7798099ea196a10132cd8ecfa5d087b84928b514192e74f4c32baf2f2d5
-
SSDEEP
768:QbuipFA13weNFSmOEgYJ0+wIs+cN+Tnc/9/8IZnS0R0TYWfHenHLqHCTHgpQO0M:ctA1geNFSvEA+wMcN+Tnsx5S0REQO0M
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rauoza.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 rauoza.exe -
Loads dropped DLL 2 IoCs
pid Process 2740 27c3da81b80c10c5041f1083d568b778.exe 2740 27c3da81b80c10c5041f1083d568b778.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\rauoza = "C:\\Users\\Admin\\rauoza.exe" rauoza.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe 2156 rauoza.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 27c3da81b80c10c5041f1083d568b778.exe 2156 rauoza.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2156 2740 27c3da81b80c10c5041f1083d568b778.exe 28 PID 2740 wrote to memory of 2156 2740 27c3da81b80c10c5041f1083d568b778.exe 28 PID 2740 wrote to memory of 2156 2740 27c3da81b80c10c5041f1083d568b778.exe 28 PID 2740 wrote to memory of 2156 2740 27c3da81b80c10c5041f1083d568b778.exe 28 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27 PID 2156 wrote to memory of 2740 2156 rauoza.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\27c3da81b80c10c5041f1083d568b778.exe"C:\Users\Admin\AppData\Local\Temp\27c3da81b80c10c5041f1083d568b778.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\rauoza.exe"C:\Users\Admin\rauoza.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD58e4c0a94978a52fa21f8e53901d840d1
SHA1dd20dbfe7332bee6dcac670bb8ec5324c1a3e65a
SHA25697528e7628e1ea72d9f6d9ecd3532654b01d6902abb6751ef321609b0928af27
SHA512e3c8f1fdd8b727390c9788d310460eea0a1237ab7423db4cd56c498c794da478b3064eca5c63dec940172769f82f7dc8170a559e7e229e1dadd89883ae139546