Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
Resource
win10v2004-20220812-en
General
-
Target
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe
-
Size
156KB
-
MD5
717e66cbcda10e096555e02a8dda1022
-
SHA1
230e6d6d26f8da94e4a0004543edcbc4f6139973
-
SHA256
c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b
-
SHA512
6c9d23ab59b93dd00d0b77a2f23b44a10ebde17fac6ea0cb063dc64ecb75c319d4030b39b60fa09f1e66af70c0619974b8fe94d17091cfee4c8bd2b420d671ca
-
SSDEEP
3072:MBd1BE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANAKE5j4oQHZ:OdDE2R7Qvb4tQTaCeFP4ACd
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vaizoa.exe -
Executes dropped EXE 1 IoCs
pid Process 5040 vaizoa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /S" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /x" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /p" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /L" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /w" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /l" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /A" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /H" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /e" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /b" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /o" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /g" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /r" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /B" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /u" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /C" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /T" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /F" vaizoa.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /b" c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /O" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /f" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /P" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /Z" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /Q" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /W" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /D" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /X" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /V" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /m" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /K" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /R" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /j" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /J" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /s" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /n" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /M" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /z" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /a" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /q" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /t" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /v" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /d" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /Y" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /h" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /U" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /G" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /E" vaizoa.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /I" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /y" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /i" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /N" vaizoa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vaizoa = "C:\\Users\\Admin\\vaizoa.exe /c" vaizoa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 644 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe 5040 vaizoa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 644 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 5040 vaizoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 644 wrote to memory of 5040 644 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 82 PID 644 wrote to memory of 5040 644 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 82 PID 644 wrote to memory of 5040 644 c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe"C:\Users\Admin\AppData\Local\Temp\c0bc1de86f71d1724083963e4a1031b2defa07f473c2281bb3860f76a094f38b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\vaizoa.exe"C:\Users\Admin\vaizoa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57b71c1cb37e767b1fd3bda524bb52a8a
SHA152877c15b90df424ee04e0af6f2086ba3a4aa37f
SHA256b9ec171f0de6590d5c3b6b7a9c3ea93c1c570e035d51b8e2f8595625395a1c4b
SHA512d18282a7c1cc8f022eecfbd3009d1c30567db59d8dd0a4424d692d2eef4138c001dcb2a92fe0c1f9dd3dda8c3d419887af4dde75f56f35ccd6ca811957a63593
-
Filesize
156KB
MD57b71c1cb37e767b1fd3bda524bb52a8a
SHA152877c15b90df424ee04e0af6f2086ba3a4aa37f
SHA256b9ec171f0de6590d5c3b6b7a9c3ea93c1c570e035d51b8e2f8595625395a1c4b
SHA512d18282a7c1cc8f022eecfbd3009d1c30567db59d8dd0a4424d692d2eef4138c001dcb2a92fe0c1f9dd3dda8c3d419887af4dde75f56f35ccd6ca811957a63593