Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe
Resource
win10v2004-20240412-en
General
-
Target
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe
-
Size
204KB
-
MD5
25455b745a75237a9611c683b9741314
-
SHA1
0d46b505694d8def85bf580dbb9a4f5b7acf5525
-
SHA256
ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694
-
SHA512
3604391d10e3b8f2b94d6aef17372cc896d79c416e2ee734cf7b54c16b7c6c340e8f34bf5031e18f1b153180a78459891935e96ae98e92ff56ec6c5e08fe76bd
-
SSDEEP
1536:IU9d4HQ4zxHwxhzbaxNy3tQ9CW5EZWHakMwP9W6uXNi9f1AWa11GBPIdRONd+w6N:JaHQLva0tQ9nLHbB9W+k9ZJgImCtUw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe Set value (int) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yoaeke.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe -
Executes dropped EXE 1 IoCs
pid Process 748 yoaeke.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /i" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /t" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /y" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /b" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /v" ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /c" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /l" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /g" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /w" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /e" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /q" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /j" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /f" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /s" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /z" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /k" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /p" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /a" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /u" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /r" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /v" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /m" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /x" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /d" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /n" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /o" yoaeke.exe Set value (str) \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yoaeke = "C:\\Users\\Admin\\yoaeke.exe /h" yoaeke.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1236 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 1236 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe 748 yoaeke.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1236 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 748 yoaeke.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 748 1236 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 99 PID 1236 wrote to memory of 748 1236 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 99 PID 1236 wrote to memory of 748 1236 ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe"C:\Users\Admin\AppData\Local\Temp\ff53d1af3691353d25e995a33ac485d288edcd8f1b2e7df08bbf3324f15a4694.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\yoaeke.exe"C:\Users\Admin\yoaeke.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5abee50e21f8f3cfcb366c4ef94f362f3
SHA17decfc32a6c1a81dc3b7d41ac4e1e5f56dc784ad
SHA256406b3dcb38a8bd7e2be631d23ff8add2aa97261d95702852193dda5bef980f13
SHA512cb2e12dcdccad4c10f4ba0daa6fb6140f3f7c1d43f270b24d23334d5cb39b2887e5faba3ca5351f1eaf031740ebb2bd76b60346cb4e1afb0c953c89f448dff12