Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe
Resource
win10v2004-20240419-en
General
-
Target
b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe
-
Size
68KB
-
MD5
70ed4990693413624edb006ef2da872a
-
SHA1
06c8e5467be1628149c55a6d65fa23c9e9f2b73a
-
SHA256
b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88
-
SHA512
0e1b396baabc3e43bfd78a3ee741d8467e7c4e2c4433c1f2c2e8bd97d1ba9ab7960108872ad17324695758cb5f4bc9eb354f1a8c45a00d83fd96f328f3c8733f
-
SSDEEP
1536:1teqKDlXvCDB04f5Gn/L8FlADNt3d1Hw8r:Olg35GTslA5t3/w8r
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" erreabup-adoab.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49} erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49}\IsInstalled = "1" erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{45584E43-4c5a-4c49-4558-4E434C5A4c49}\StubPath = "C:\\Windows\\system32\\evheagac.exe" erreabup-adoab.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ecnuxoat-idur.exe" erreabup-adoab.exe -
Executes dropped EXE 2 IoCs
pid Process 4648 erreabup-adoab.exe 3676 erreabup-adoab.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" erreabup-adoab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" erreabup-adoab.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} erreabup-adoab.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\hxabuv-ukat.dll" erreabup-adoab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" erreabup-adoab.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\erreabup-adoab.exe b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe File created C:\Windows\SysWOW64\erreabup-adoab.exe b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe File created C:\Windows\SysWOW64\ecnuxoat-idur.exe erreabup-adoab.exe File opened for modification C:\Windows\SysWOW64\evheagac.exe erreabup-adoab.exe File created C:\Windows\SysWOW64\evheagac.exe erreabup-adoab.exe File opened for modification C:\Windows\SysWOW64\ecnuxoat-idur.exe erreabup-adoab.exe File opened for modification C:\Windows\SysWOW64\hxabuv-ukat.dll erreabup-adoab.exe File created C:\Windows\SysWOW64\hxabuv-ukat.dll erreabup-adoab.exe File opened for modification C:\Windows\SysWOW64\erreabup-adoab.exe erreabup-adoab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 3676 erreabup-adoab.exe 3676 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe 4648 erreabup-adoab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4468 b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe Token: SeDebugPrivilege 4648 erreabup-adoab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 4648 4468 b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe 84 PID 4468 wrote to memory of 4648 4468 b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe 84 PID 4468 wrote to memory of 4648 4468 b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe 84 PID 4648 wrote to memory of 616 4648 erreabup-adoab.exe 5 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3676 4648 erreabup-adoab.exe 85 PID 4648 wrote to memory of 3676 4648 erreabup-adoab.exe 85 PID 4648 wrote to memory of 3676 4648 erreabup-adoab.exe 85 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56 PID 4648 wrote to memory of 3692 4648 erreabup-adoab.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe"C:\Users\Admin\AppData\Local\Temp\b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88.exe"2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\erreabup-adoab.exe"C:\Windows\system32\erreabup-adoab.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\erreabup-adoab.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD52ed2ef178a30a50eee516e26cbf1fff8
SHA1ef643d775258e3cfd980412180e709702d50cd90
SHA256ad2aed09d8b78254b9e16abb1a9664459baf741961fab9df312c298aab2369c3
SHA5120ff23174bc5f8d52927b06da7cf4855741fcf125fa211e0aaec8c474a4c1bfc15eb5197e347bb1bbf314368f78c0c7ed63b97cf8052d8869855eb930edecc1f7
-
Filesize
68KB
MD570ed4990693413624edb006ef2da872a
SHA106c8e5467be1628149c55a6d65fa23c9e9f2b73a
SHA256b4ddc855616634edce61726039de9976ccc4a2e58de4ec0c1d7f81ac2ba25b88
SHA5120e1b396baabc3e43bfd78a3ee741d8467e7c4e2c4433c1f2c2e8bd97d1ba9ab7960108872ad17324695758cb5f4bc9eb354f1a8c45a00d83fd96f328f3c8733f
-
Filesize
70KB
MD5ef2d8f1f71a4068050c7eee0f008944e
SHA19ed448028c9e9ccf4236dfd407ec0860d32e13ba
SHA256c8c11f0279d9cfb7234385c72c5b8fbb1265fb9179254c347d1666442f552432
SHA512229982259e720f7a35c4aada3eb8da3f7a50ca4b4e3c1e81a04f89bd9b5a56d0b767991c33fcc27400cd40639e826a9337231ce2108d149249492bec3d160314
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4