Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe
Resource
win10v2004-20240426-en
General
-
Target
d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe
-
Size
72KB
-
MD5
066858d7dedd390b8fdde347971c9f32
-
SHA1
1909ff5bc20b7609d4d95011c02391fab5146136
-
SHA256
d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5
-
SHA512
6e0e1a070a04a7fbce109f4614e8f27da0523fbffb35b25f39e442d28cbe6429a6ab34390acfa476469b1e9825f8c49f8ff3a08f4144e6ecddf9174130aa8af8
-
SSDEEP
768:x/n2kOjjhB/9BIGwsSsNsOu3uwng7GIWsT/C9BJc3meUcWN075RrLhdP24wgsiEU:xJOjjhh7InsXDDVTWBeHWN075RxFJYY
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ouhturuc.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59434C45-5854-414c-5943-4C455854414c}\01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123 = "a" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59434C45-5854-414c-5943-4C455854414c}\IsInstalled = "1" ouhturuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59434C45-5854-414c-5943-4C455854414c}\StubPath = "C:\\Windows\\system32\\arxooroam-idoab.exe" ouhturuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{59434C45-5854-414c-5943-4C455854414c} ouhturuc.exe -
Sets file execution options in registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe ouhturuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 = "a" ouhturuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Windows\\system32\\ivhamic.exe" ouhturuc.exe -
Executes dropped EXE 2 IoCs
pid Process 1920 ouhturuc.exe 848 ouhturuc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "25600" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "25600" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "25600" ouhturuc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "25600" ouhturuc.exe -
Modifies WinLogon 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B} ouhturuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ouhturuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345 = "a" ouhturuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\DLLName = "C:\\Windows\\system32\\ouvvidug.dll" ouhturuc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\{BC84DF00-BC38-9902-8082-6FCBF2D87A0B}\Startup = "Startup" ouhturuc.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\arxooroam-idoab.exe ouhturuc.exe File created C:\Windows\SysWOW64\arxooroam-idoab.exe ouhturuc.exe File opened for modification C:\Windows\SysWOW64\ouvvidug.dll ouhturuc.exe File created C:\Windows\SysWOW64\ouvvidug.dll ouhturuc.exe File opened for modification C:\Windows\SysWOW64\ouhturuc.exe ouhturuc.exe File created C:\Windows\SysWOW64\ouhturuc.exe d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe File created C:\Windows\SysWOW64\ivhamic.exe ouhturuc.exe File opened for modification C:\Windows\SysWOW64\ouhturuc.exe d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe File opened for modification C:\Windows\SysWOW64\ivhamic.exe ouhturuc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 848 ouhturuc.exe 848 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe 1920 ouhturuc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1920 ouhturuc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1920 1236 d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe 83 PID 1236 wrote to memory of 1920 1236 d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe 83 PID 1236 wrote to memory of 1920 1236 d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe 83 PID 1920 wrote to memory of 608 1920 ouhturuc.exe 5 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 848 1920 ouhturuc.exe 84 PID 1920 wrote to memory of 848 1920 ouhturuc.exe 84 PID 1920 wrote to memory of 848 1920 ouhturuc.exe 84 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56 PID 1920 wrote to memory of 3552 1920 ouhturuc.exe 56
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe"C:\Users\Admin\AppData\Local\Temp\d3cd7c36e1f9c76a1ce0a24324bcf264806560930ff07fc56273ba7c63f706a5.exe"2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\ouhturuc.exe"C:\Windows\SysWOW64\ouhturuc.exe"3⤵
- Windows security bypass
- Modifies Installed Components in the registry
- Sets file execution options in registry
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\ouhturuc.exe--k33p4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56bb9aaaefd2de1712bea76fd2bccf127
SHA138034f5f2d547a1a9684ced14f3be3652df20ddb
SHA2569720e3b428078787657062d131e8fc9046fb13286e351e70f4028f2bff04bc31
SHA512da38943f7ea3b8bdd318d61a0febfaff1a271b0095f57e947126ca80c52e750498be1149e9107a13607df67e112ee94eb08d3b34087bd292d4148b05b0938399
-
Filesize
73KB
MD5d18c11564fb119083049d4ce4ff352ac
SHA117953dcf5483e34d09b0acc154c8966332242c2c
SHA256f1d23e1c5d3a8a6be49781127410d14cab89850cf2c535de644c9f3a7fe16c48
SHA512fef24c933ceaf4eeac3f60f2f2a66d4db3955e792d18c3e99211489e960beeb44f50adeec99532d052a6ba1b45caf467d4a574287090c16ef5c6c2d22ba883b0
-
Filesize
70KB
MD55c2f0f6b2f4ef298b43976f8f7b188e0
SHA1b616df2a9284cdb315349e579dea9db7082cf00e
SHA25619386fe3e8150e1925ef6f84877441016a252d20e40beff32f35169d013cfa15
SHA512abb7765c523b9c36bb45ff7d8f4fdae9ac5d04948c497b58a726c4c1178c3ae0c018f2b064273139715a6b40cce32ff60d40df8dd399fe599ee616f43b4053bd
-
Filesize
5KB
MD5f37b21c00fd81bd93c89ce741a88f183
SHA1b2796500597c68e2f5638e1101b46eaf32676c1c
SHA25676cf016fd77cb5a06c6ed4674ddc2345e8390c010cf344491a6e742baf2c0fb0
SHA512252fe66dea9a4b9aebc5fd2f24434719cb25159ba51549d9de407f44b6a2f7bce6e071be02c4f2ad6aef588c77f12c00ed415eb54f96dec1b077326e101ce0f4