Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe
Resource
win10v2004-20240412-en
General
-
Target
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe
-
Size
204KB
-
MD5
25455b745a75237a9611c683b9741314
-
SHA1
0d46b505694d8def85bf580dbb9a4f5b7acf5525
-
SHA256
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694
-
SHA512
3604391d10e3b8f2b94d6aef17372cc896d79c416e2ee734cf7b54c16b7c6c340e8f34bf5031e18f1b153180a78459891935e96ae98e92ff56ec6c5e08fe76bd
-
SSDEEP
1536:IU9d4HQ4zxHwxhzbaxNy3tQ9CW5EZWHakMwP9W6uXNi9f1AWa11GBPIdRONd+w6N:JaHQLva0tQ9nLHbB9W+k9ZJgImCtUw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xqbob.exe -
Executes dropped EXE 1 IoCs
pid Process 1884 xqbob.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /k" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /v" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /i" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /e" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /x" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /r" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /m" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /u" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /c" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /p" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /g" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /w" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /b" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /z" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /o" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /s" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /y" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /a" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /n" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /d" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /t" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /l" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /j" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /i" ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /q" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /h" xqbob.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\xqbob = "C:\\Users\\Admin\\xqbob.exe /f" xqbob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe 1884 xqbob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 1884 xqbob.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1884 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 28 PID 1968 wrote to memory of 1884 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 28 PID 1968 wrote to memory of 1884 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 28 PID 1968 wrote to memory of 1884 1968 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe"C:\Users\Admin\AppData\Local\Temp\ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\xqbob.exe"C:\Users\Admin\xqbob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD57f8c15a184e3daec896041c82d8938bf
SHA1945c237529bce2d771d7d8e5c082ebd2ce2d4d1e
SHA256bd5d394bc64de96aed7c8d45b3b574625c69a7639c01d5aa934e4138acf8c998
SHA512a8a67ed5105e0fd9f939d16b567d72406c520318539e0786730735d995fa2612707f7e04c1add72fefb63f33b8c4a269045db0c9282747fc32f5a61881b3dcd8