Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe
Resource
win10v2004-20220901-en
General
-
Target
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe
-
Size
120KB
-
MD5
53c8cf3248b56ceda5d9563363607566
-
SHA1
a220aa9e0845c4ed9e29c2d41dc2f2dd4efb193b
-
SHA256
c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418
-
SHA512
79248618f765ec4509e6b243ac7e27a01cf2fb567f7c9bd8751445e44835b6cf5d540af4678b5cfd04bb63b1b0bee4d21f90fad03b307095bff9b1dbf1a4d8ad
-
SSDEEP
1536:tusUZAfeEvVkdXGE2Mtf9oUrUQKVQg9F5tkV7pjuX5e6wTeU/60hQHy4kt5r:/UAemVkR2MtF3SV9qThay5r
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" crwoit.exe -
Executes dropped EXE 1 IoCs
pid Process 564 crwoit.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /o" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /w" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /i" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /b" crwoit.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /m" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /d" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /e" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /v" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /c" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /t" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /s" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /p" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /x" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /s" c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /a" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /r" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /q" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /k" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /z" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /n" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /u" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /g" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /f" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /j" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /y" crwoit.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /l" crwoit.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\crwoit = "C:\\Users\\Admin\\crwoit.exe /h" crwoit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe 564 crwoit.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 564 crwoit.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 564 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 27 PID 2016 wrote to memory of 564 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 27 PID 2016 wrote to memory of 564 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 27 PID 2016 wrote to memory of 564 2016 c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe"C:\Users\Admin\AppData\Local\Temp\c4296bc4f7e21ff80269545c2cc62e2dcd9ff17c23c788441945b13c33143418.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\crwoit.exe"C:\Users\Admin\crwoit.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD524ec6cea93094afb51b5c85d833d8944
SHA14620f06c04a19b19c91d521ee20e17490b92ff49
SHA2569aa4a6592550381ccae3b0ac7cd915dcfa9014c03d00602eb0dfd7b4e44a785f
SHA512d50ea7997547d8f35d1b0edcd2b8d8861da78719cb1744269d12a8b79d5d5c3ef4269405f9a44ef3e67c424aa25a373f57096ab7540ca554b15ad03a89589cdc
-
Filesize
120KB
MD524ec6cea93094afb51b5c85d833d8944
SHA14620f06c04a19b19c91d521ee20e17490b92ff49
SHA2569aa4a6592550381ccae3b0ac7cd915dcfa9014c03d00602eb0dfd7b4e44a785f
SHA512d50ea7997547d8f35d1b0edcd2b8d8861da78719cb1744269d12a8b79d5d5c3ef4269405f9a44ef3e67c424aa25a373f57096ab7540ca554b15ad03a89589cdc
-
Filesize
120KB
MD524ec6cea93094afb51b5c85d833d8944
SHA14620f06c04a19b19c91d521ee20e17490b92ff49
SHA2569aa4a6592550381ccae3b0ac7cd915dcfa9014c03d00602eb0dfd7b4e44a785f
SHA512d50ea7997547d8f35d1b0edcd2b8d8861da78719cb1744269d12a8b79d5d5c3ef4269405f9a44ef3e67c424aa25a373f57096ab7540ca554b15ad03a89589cdc
-
Filesize
120KB
MD524ec6cea93094afb51b5c85d833d8944
SHA14620f06c04a19b19c91d521ee20e17490b92ff49
SHA2569aa4a6592550381ccae3b0ac7cd915dcfa9014c03d00602eb0dfd7b4e44a785f
SHA512d50ea7997547d8f35d1b0edcd2b8d8861da78719cb1744269d12a8b79d5d5c3ef4269405f9a44ef3e67c424aa25a373f57096ab7540ca554b15ad03a89589cdc