Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe
Resource
win10v2004-20220812-en
General
-
Target
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe
-
Size
184KB
-
MD5
640d7f45c462bebee73b6e3ae2f03609
-
SHA1
00437bf48d7a811a8294b845d969d465ea6602e8
-
SHA256
a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2
-
SHA512
d497c6deb494adf8a5158fe1258e068f8826e9b4b32077339ee09d203276901d41bf5a4dd38796dc7a3360a326032abc85978e2edc705b97b657d03332d58dbb
-
SSDEEP
3072:bwQPuusqJG6Z2C+yWKOSeu+yyF4GG5Mvq/g7g6pJ12qGoe/:bdcFluJqGom
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xeioriq.exe -
Executes dropped EXE 1 IoCs
pid Process 764 xeioriq.exe -
Loads dropped DLL 2 IoCs
pid Process 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /d" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /i" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /k" xeioriq.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /q" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /m" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /e" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /g" xeioriq.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /w" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /j" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /o" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /c" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /h" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /v" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /l" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /t" a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /u" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /y" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /b" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /x" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /r" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /z" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /f" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /n" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /a" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /p" xeioriq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xeioriq = "C:\\Users\\Admin\\xeioriq.exe /s" xeioriq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe 764 xeioriq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 764 xeioriq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 764 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 27 PID 620 wrote to memory of 764 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 27 PID 620 wrote to memory of 764 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 27 PID 620 wrote to memory of 764 620 a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe"C:\Users\Admin\AppData\Local\Temp\a69f4d3155d6722cfc5c7d63a5a09323c55c466b4028098624a8ff128919a1e2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\xeioriq.exe"C:\Users\Admin\xeioriq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD57ba4cbadcc1b7429130e9714970d2574
SHA1febd0bf51dcbde44c5e5365738e9796c32d5125b
SHA2567c7febface7b328224dd3b83383c48b716013f23782f87d9fa7a4ad6451cee59
SHA51200c2a65e826eb43795a8ecc31a09a2d3cd268b8711211f5a52009904d3bec5d17dbfbea278f1717b6fb9487227bd5a375b0f9364d391500a2eaff1d3f8ec3ff3
-
Filesize
184KB
MD57ba4cbadcc1b7429130e9714970d2574
SHA1febd0bf51dcbde44c5e5365738e9796c32d5125b
SHA2567c7febface7b328224dd3b83383c48b716013f23782f87d9fa7a4ad6451cee59
SHA51200c2a65e826eb43795a8ecc31a09a2d3cd268b8711211f5a52009904d3bec5d17dbfbea278f1717b6fb9487227bd5a375b0f9364d391500a2eaff1d3f8ec3ff3
-
Filesize
184KB
MD57ba4cbadcc1b7429130e9714970d2574
SHA1febd0bf51dcbde44c5e5365738e9796c32d5125b
SHA2567c7febface7b328224dd3b83383c48b716013f23782f87d9fa7a4ad6451cee59
SHA51200c2a65e826eb43795a8ecc31a09a2d3cd268b8711211f5a52009904d3bec5d17dbfbea278f1717b6fb9487227bd5a375b0f9364d391500a2eaff1d3f8ec3ff3
-
Filesize
184KB
MD57ba4cbadcc1b7429130e9714970d2574
SHA1febd0bf51dcbde44c5e5365738e9796c32d5125b
SHA2567c7febface7b328224dd3b83383c48b716013f23782f87d9fa7a4ad6451cee59
SHA51200c2a65e826eb43795a8ecc31a09a2d3cd268b8711211f5a52009904d3bec5d17dbfbea278f1717b6fb9487227bd5a375b0f9364d391500a2eaff1d3f8ec3ff3