Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe
Resource
win10v2004-20240412-en
General
-
Target
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe
-
Size
204KB
-
MD5
4c587616b34b14a4f488d4925dc40a83
-
SHA1
fbea1bde742fbbc11055a5afb963cb4c8d54d327
-
SHA256
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed
-
SHA512
6d278d62dad5ee70f2ed0019703a43aaecf9d762929ce9d3630f940baecbb5a343ceaf53f444eb91af91b0e3d992032d66a8195157e4827179490808d9bc69f8
-
SSDEEP
3072:kmlW8tB0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWYQ:/0E4QxL7B9W0c1RCzR/fSmlu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe Set value (int) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voauz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe -
Executes dropped EXE 1 IoCs
pid Process 4812 voauz.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /q" 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /t" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /j" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /z" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /d" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /r" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /o" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /f" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /c" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /p" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /v" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /u" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /b" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /y" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /k" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /i" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /w" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /e" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /x" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /h" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /l" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /m" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /s" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /q" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /g" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /n" voauz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\voauz = "C:\\Users\\Admin\\voauz.exe /a" voauz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 4532 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe 4812 voauz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4532 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 4812 voauz.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4812 4532 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 89 PID 4532 wrote to memory of 4812 4532 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 89 PID 4532 wrote to memory of 4812 4532 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe"C:\Users\Admin\AppData\Local\Temp\35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\voauz.exe"C:\Users\Admin\voauz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD53eda69ba881e10081f6223a8f1a5d69a
SHA18720a5c2e1636fdb6b26ed1154e9de53b3378d5b
SHA256c00a9576f6a82677a2bfad63424556a0539669e3809ddadbed43ca67968630b2
SHA512c5ed020a4f6335dcafd78227fd220e1a6281d7f8565af8f06105582785a3321f68e33b3264b8dbf1b8b27df7b96c605875e5d65e83d884d026eddeca2500e3c1