Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe
Resource
win10v2004-20220812-en
General
-
Target
17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe
-
Size
192KB
-
MD5
6ad35ddb76fc57062bf65671f8539e09
-
SHA1
2c47593edd825af1b536a0c197d22bf1f402192c
-
SHA256
17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b
-
SHA512
0048d26402d908494d7622d84b49c9670ca04ee3657e4468caafa2edde8d46f07ec6a7042219827ac1666f8b1dc0a04467f09df704727d279730a918f56d2da1
-
SSDEEP
1536:+p9c72Oan2aaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2:+dO2cW3kCFrWsF2eLbqx2AXFs89
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" raixiz.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 raixiz.exe -
Loads dropped DLL 2 IoCs
pid Process 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /n" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /b" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /a" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /l" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /w" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /f" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /p" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /g" 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /y" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /j" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /i" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /z" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /x" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /d" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /v" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /c" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /g" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /e" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /k" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /t" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /m" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /u" raixiz.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /r" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /s" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /o" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /q" raixiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\raixiz = "C:\\Users\\Admin\\raixiz.exe /h" raixiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe 2024 raixiz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 2024 raixiz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 828 wrote to memory of 2024 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 27 PID 828 wrote to memory of 2024 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 27 PID 828 wrote to memory of 2024 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 27 PID 828 wrote to memory of 2024 828 17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe"C:\Users\Admin\AppData\Local\Temp\17124758a34e3d416d860900b22a8363d1f6aa49d87a1af742ff86996886357b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\raixiz.exe"C:\Users\Admin\raixiz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD50ef9a40179ad7332ff7b3515b0ad3be8
SHA1aabe1aab9ef9365c8367fbb5533f05b752733b8f
SHA25600ee08e857e87ae11490d9b963e73a65f14a2124e15c8d1d69e76509d0318866
SHA512e3e6d659d787d5a0648b579804bf351ac4a7054032fa083c49df03401b6e0a3d21f7a54a3e4486519377d0319f9ad9c3128390d84bee7a604de4317df7a463f8
-
Filesize
192KB
MD50ef9a40179ad7332ff7b3515b0ad3be8
SHA1aabe1aab9ef9365c8367fbb5533f05b752733b8f
SHA25600ee08e857e87ae11490d9b963e73a65f14a2124e15c8d1d69e76509d0318866
SHA512e3e6d659d787d5a0648b579804bf351ac4a7054032fa083c49df03401b6e0a3d21f7a54a3e4486519377d0319f9ad9c3128390d84bee7a604de4317df7a463f8
-
Filesize
192KB
MD50ef9a40179ad7332ff7b3515b0ad3be8
SHA1aabe1aab9ef9365c8367fbb5533f05b752733b8f
SHA25600ee08e857e87ae11490d9b963e73a65f14a2124e15c8d1d69e76509d0318866
SHA512e3e6d659d787d5a0648b579804bf351ac4a7054032fa083c49df03401b6e0a3d21f7a54a3e4486519377d0319f9ad9c3128390d84bee7a604de4317df7a463f8
-
Filesize
192KB
MD50ef9a40179ad7332ff7b3515b0ad3be8
SHA1aabe1aab9ef9365c8367fbb5533f05b752733b8f
SHA25600ee08e857e87ae11490d9b963e73a65f14a2124e15c8d1d69e76509d0318866
SHA512e3e6d659d787d5a0648b579804bf351ac4a7054032fa083c49df03401b6e0a3d21f7a54a3e4486519377d0319f9ad9c3128390d84bee7a604de4317df7a463f8