Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24/05/2022, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe
Resource
win10v2004-20220414-en
General
-
Target
e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe
-
Size
6.2MB
-
MD5
9af294b452c7e6d6b6698595fc25afa1
-
SHA1
a353d76c5a509b87c3895ffa8b88fbd38d3c4d7c
-
SHA256
e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031
-
SHA512
de4c752d87daf97cdbe639c7323a71941c9a9461d6f7b828f45ad0173442d99292b745a8d92a294ec73e6f2e8e3465bc849df33bfd036ab2a4c69cd30b712f49
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Windows\\System64\\1rfusclient.exe, explorer.exe" e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 1rfusclient.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe -
Executes dropped EXE 3 IoCs
pid Process 612 1rfusclient.exe 4456 svnhost.exe 4624 svnhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 1rfusclient.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run 1rfusclient.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\Zont911\Tupe.bat 1rfusclient.exe File created C:\Windows\System64\1rfusclient.exe e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe File opened for modification C:\Windows\System64\vp8decoder.dll 1rfusclient.exe File created C:\Windows\System64\vp8encoder.dll 1rfusclient.exe File opened for modification C:\Windows\System64\svnhost.exe 1rfusclient.exe File created C:\Windows\System64\systemsmss.exe 1rfusclient.exe File created C:\Windows\System64\svnhost.exe 1rfusclient.exe File opened for modification C:\Windows\System64\systemsmss.exe 1rfusclient.exe File opened for modification C:\Windows\System64\1rfusclient.exe e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe File created C:\Windows\Zont911\Regedit.reg 1rfusclient.exe File created C:\Windows\Zont911\Home.zip 1rfusclient.exe File created C:\Windows\System64\vp8decoder.dll 1rfusclient.exe File opened for modification C:\Windows\System64\vp8encoder.dll 1rfusclient.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 5000 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4456 svnhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4456 svnhost.exe 4624 svnhost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4428 wrote to memory of 612 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 81 PID 4428 wrote to memory of 612 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 81 PID 4428 wrote to memory of 612 4428 e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe 81 PID 612 wrote to memory of 5000 612 1rfusclient.exe 82 PID 612 wrote to memory of 5000 612 1rfusclient.exe 82 PID 612 wrote to memory of 5000 612 1rfusclient.exe 82 PID 612 wrote to memory of 1068 612 1rfusclient.exe 89 PID 612 wrote to memory of 1068 612 1rfusclient.exe 89 PID 612 wrote to memory of 1068 612 1rfusclient.exe 89 PID 1068 wrote to memory of 2924 1068 cmd.exe 86 PID 1068 wrote to memory of 2924 1068 cmd.exe 86 PID 1068 wrote to memory of 2924 1068 cmd.exe 86 PID 1068 wrote to memory of 4456 1068 cmd.exe 84 PID 1068 wrote to memory of 4456 1068 cmd.exe 84 PID 1068 wrote to memory of 4456 1068 cmd.exe 84 PID 1068 wrote to memory of 4624 1068 cmd.exe 85 PID 1068 wrote to memory of 4624 1068 cmd.exe 85 PID 1068 wrote to memory of 4624 1068 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe"C:\Users\Admin\AppData\Local\Temp\e1763315e4a75661f19e324cac85ea4b1acbe6ffe2a2dc9441bd6fc2d89f3031.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\System64\1rfusclient.exe"C:\Windows\System64\1rfusclient.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"3⤵
- Runs .reg file with regedit
PID:5000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Zont911\Tupe.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1068
-
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /silentinstall1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4456
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /firewall1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4624
-
C:\Windows\SysWOW64\chcp.comChcp 12511⤵PID:2924
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /start1⤵PID:4548
-
C:\Windows\System64\svnhost.exeC:\Windows\System64\svnhost.exe1⤵PID:4592
-
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe /tray2⤵PID:4168
-
-
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe2⤵PID:392
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5a0b708127a0403a75a95806f1af163df
SHA1118d847afcb31922f6ad61c3b3648ce85e534f99
SHA256f1d6d99ada408318c23dc3e49428d948e32b2d28d0eae42ccc5171c41f09bf20
SHA512d3d2fd9c240147de9a45b2255cc87efc2489039c3fc54ee4ff5e3db885037a46cc3b0e9d0ecff0c74f03e8ed2c5e50d108233398bd8f2d6ca26e1ec1640f8a2f
-
Filesize
1.4MB
MD5ffd51c3360673861ffe8707d485d7b92
SHA12ec3835362f3235b9fe89f3ddaace913d8f295c4
SHA256bb6568784419b583af9d051c99f738a28a0117e2dafe4ab0622a4dcade3604c5
SHA512e243daea811c0bd8524b8abdb5f7b7035e4ed7818703e236450c62e2088383e93518f94225fca80319b4abeed4aa83bab17b6ef3bef7cf005845a10c42c1f335
-
Filesize
105KB
MD556bde384771a737cce7feeb1229552b5
SHA1ecf2c606e4aa53b86111eb5bdbc5993ce6af999d
SHA25672ebccfc4372aaba5564f6047000ef0d5057678071c74e5827dfcdbe851e3a00
SHA512519cd53fcf72e4f57207189373f52dc08bb79ac94ec790551b02b215edabfe6b15328545045e57fabda58332c9d73c6521aa474e794125a45790add17ef7ec49
-
Filesize
185KB
MD5eff2960c522fbc1ec1deb32b1d931b89
SHA10d30c59616e8150b14ed8fdd3fd7406cbbded01a
SHA2569514c6d30abe5463c5562f0cc25c2364be3b878db2ed13590b35a630bd5014ba
SHA5128c03af8adad589be55770c40e5254493c2ef42a5cd2da4a3950ae94a7047ea4f33777bd8ff35172a07d4d72b3320db53a080f867adb4c7d5128f953f504beb83
-
Filesize
187KB
MD520d6500b26914c05af02ccfb302b1aed
SHA12ca29f54df7f738429eebe4f18616d87d0d565ce
SHA256cf5b108ca926be2ebfb44818d4f8c8428acbbe0ba540418778b53b01b92073d5
SHA5120aa54e6978b66884e247bd0ef784f9b13186f4ad54c9a87fc213bcb37263c48fdea6b434c9559911b0cd80e161a39005942b5ab4d0a4f8a79108c227372ea798
-
Filesize
149KB
MD5c45f6daaf6072d69e376cd4ad47d63bf
SHA1a87f05e72d50a57879933f5341287d3488bf1e77
SHA256dc65cec19d603561ab9f9bf9025bdc1a6e33d5bf08ab3b40b19b3516ce5dbba2
SHA5124ef76c59b132d995f83de39309f1667efcb1a24b65f9af71b7d1d76914bc1d6fc5d05c5a245ec204380242071e37e770bb0a77089d2591118f6214628329d6c9
-
Filesize
175KB
MD573351b6944337f2ad144ef9d2b015570
SHA10c9467c7034569c5e7d6a0f44d932e957cc874f5
SHA25622bf534da472b0019e2502fb66e8b0269292a43a22755cd7ca101b281415d740
SHA51216f80d9fa6e8dd2c2f78b2130f4ae764396d845c96b8bff4e2e967c05f8bcd8ca674eb4c62ca988a09fbddd0dabc8fbd69650b314112c1a711b7abda043b1a71
-
Filesize
135KB
MD5ad243eac725efe2e56fef5f0957d50e6
SHA1d5faa676499475fa40949c010a1645a85a495193
SHA256a07e0e66ac804a0c8022c163dcd80852ea0a942bb26bcffa3a15c74e1f6d27a8
SHA5126b5e4c3e81d8a1402f01c3838cc85ad7538893c6bc0c902cfeadd944edd343be24e441847443bf13ee6b01e26d15fb483e651428c1a5652fd057dbfd0e605dfc
-
Filesize
195KB
MD50f72af047b95135a8eb6137815208e3e
SHA1ab0a087eea06421fce4e1ca01882ea2e26420faa
SHA256077b24c80f819e84eca5dd99d5a5ae7a211daf7fd5e916aaa1deda7ce0af741f
SHA5123259f836fc8d1afa563699a5ed6758c0c74a6fe769e32175cd548714cd67f7ad5d442f6463fe01481681437c2fbaee9e5e8070f2e7980865b68662f950f3ee6c
-
Filesize
136KB
MD51ca3c052eb42fd72e2492a85c26ea4d2
SHA157990711b6e0a47f85f095bceef1fc24addaf8f7
SHA2561e000013585fe39f9e1e2f90872740ac449f671979c1800709ca3d2d92cb2d2f
SHA512f7da3b132836a4c2e5a1f92fcf36e8ac93e9d7a7a115018d71f5a692f606327b7e36180e7206b1c65a1df5eb03b8acaa2e9e58159680c346b3d1cfd1623a56b2
-
Filesize
139KB
MD55b3b95305455ade889ced37278a7edea
SHA1041ba16b04ca153ea8e0cb5aee753430c66522c2
SHA256438931666f33395fa5940ad444045f151d34963c88e449d2acec94aac240ff3a
SHA51213a2b6de51a3ab29a9b10569cf07fcf5e8130fa583769d1653276b0c46d4bb6360e6b8f39e89e9397d30c4e4a5f90d3b09e1990f58cfb81ea805f6e01ad3e202
-
Filesize
227KB
MD58f5756802a389d8061ed4685f0af9eb6
SHA1419215ed1696083ffdfdd74cfd7983a9832410b6
SHA2561f86cf082d5c1060561b696c6bb57d398d55d6187c240c99fe3c8c306012bced
SHA51265e55a1d13071ffb3ffda881d7e1a7781fda054b84ac365220409c1b9e5d3b5a9256b0e3d5f2904f8080dd319a59ddd49c069f904658eec4f0bacfb0263d4fbd
-
Filesize
11KB
MD5197ede8c427e5b375c6e8c5b0cc6da21
SHA18068ff6e5750931b323b66c8a5d7ae844bf4f7ae
SHA2561360100a21148dc3073474ea2ac0aa7c3eca89290901421d2b78d5452c26aa0f
SHA5127a578298169b2f5ebcfdea41d7c871d1397407079f39905572a14bd89132f516cff7c35273d3591a7edb42d178dbab1cc96cda200a358b8459b5b35190d65ab7
-
Filesize
281B
MD5020d7ae318d01b6d0d92aa48ef198e82
SHA1709c08b071bd6cf789ed6667b4f7c957338e81aa
SHA2566fbce5a6530fe597afa45f71efba019f881765e26eeaa964d653c266e609593e
SHA512b1ac136d59539f72773d9d3aa190e2d87e9ed8d909e6e8c3c5a6e8feb737543855e72a592429ef4372edb3cdd1fc67537b8e058da56b8d7517d8a57e753fcef0