Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe
Resource
win10v2004-20220901-en
General
-
Target
57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe
-
Size
192KB
-
MD5
43682b9f05cef3f3f661cb7c760fc498
-
SHA1
c9d756f3558eb46d490e1b220998e893dd45fe08
-
SHA256
57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43
-
SHA512
be363bb832f3ebd5225aad2f02ec771b92b978ed38ec7c5834781cf4c5af2343e23b4fabaa59bd782eb49dfd4c651e64d872dcacda8a077aa2b97a5362b9b1e2
-
SSDEEP
1536:jZcD2OahSaaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2m3:POGAW3kCFrWsF2eLbqx2XMFs89
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" klzaz.exe -
Executes dropped EXE 1 IoCs
pid Process 912 klzaz.exe -
Loads dropped DLL 2 IoCs
pid Process 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /q" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /z" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /e" 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /a" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /p" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /u" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /e" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /f" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /i" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /j" klzaz.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /h" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /o" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /t" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /m" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /l" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /c" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /r" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /v" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /n" klzaz.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /k" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /b" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /g" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /s" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /y" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /x" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /w" klzaz.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\klzaz = "C:\\Users\\Admin\\klzaz.exe /d" klzaz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe 912 klzaz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 912 klzaz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1112 wrote to memory of 912 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 26 PID 1112 wrote to memory of 912 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 26 PID 1112 wrote to memory of 912 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 26 PID 1112 wrote to memory of 912 1112 57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe"C:\Users\Admin\AppData\Local\Temp\57497d9e31c87d24875f9a0223e26f7be27b1cabf745f7e37a13649855a1ba43.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\klzaz.exe"C:\Users\Admin\klzaz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD53d70a8aae7a5e0af62761eb035a09e41
SHA15351a41debd57a788b076eabfe439d10792a9370
SHA256eb3c99a92128a18c9f899e59eb49515b3eee99eff1960b08f47087c2cc142190
SHA51293da89f534c870343e01e40d571895bf75a5364d8844c59b48fa7106453ce1e78252a6f22cec5310a3ced6af9991d24bbc7dfbd7d0c0bf71c5846165b8e7bbc8
-
Filesize
192KB
MD53d70a8aae7a5e0af62761eb035a09e41
SHA15351a41debd57a788b076eabfe439d10792a9370
SHA256eb3c99a92128a18c9f899e59eb49515b3eee99eff1960b08f47087c2cc142190
SHA51293da89f534c870343e01e40d571895bf75a5364d8844c59b48fa7106453ce1e78252a6f22cec5310a3ced6af9991d24bbc7dfbd7d0c0bf71c5846165b8e7bbc8
-
Filesize
192KB
MD53d70a8aae7a5e0af62761eb035a09e41
SHA15351a41debd57a788b076eabfe439d10792a9370
SHA256eb3c99a92128a18c9f899e59eb49515b3eee99eff1960b08f47087c2cc142190
SHA51293da89f534c870343e01e40d571895bf75a5364d8844c59b48fa7106453ce1e78252a6f22cec5310a3ced6af9991d24bbc7dfbd7d0c0bf71c5846165b8e7bbc8
-
Filesize
192KB
MD53d70a8aae7a5e0af62761eb035a09e41
SHA15351a41debd57a788b076eabfe439d10792a9370
SHA256eb3c99a92128a18c9f899e59eb49515b3eee99eff1960b08f47087c2cc142190
SHA51293da89f534c870343e01e40d571895bf75a5364d8844c59b48fa7106453ce1e78252a6f22cec5310a3ced6af9991d24bbc7dfbd7d0c0bf71c5846165b8e7bbc8