Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe
Resource
win10v2004-20220901-en
General
-
Target
97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe
-
Size
320KB
-
MD5
6022bc3d7d1b2535903e902305a13c20
-
SHA1
5715f8d525eaab85766e01dcc8d843ebb0e9d743
-
SHA256
97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba
-
SHA512
f0a240133f510d0d17acd5a8e8313c777a6420f8097ae36da751697aa0111ce6ca0edaf8976a1653ea342d528f1480f8a729d193d4932ee8dfab7b3a48d6caab
-
SSDEEP
6144:GXjXOBRtoITkA53pK122OWXHCmHZW50l7F9R6ew+O:yaBRtMcow2OWXH5HZW5qHRXO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xiowan.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 xiowan.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /i" xiowan.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /t" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /b" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /f" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /i" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /l" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /m" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /o" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /u" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /y" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /r" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /c" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /d" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /g" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /t" 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /v" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /f" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /p" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /c" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /t" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /h" xiowan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /o" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /b" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /a" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /h" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /d" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /z" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /l" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /z" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /x" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /a" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /k" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /x" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /m" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /e" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /g" xiowan.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /q" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /s" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /n" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /n" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /k" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /v" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /s" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /w" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /r" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /q" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /j" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /y" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /p" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /e" xiowan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /u" xiowan.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /k" 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /j" xiowan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiowan = "C:\\Users\\Admin\\xiowan.exe /w" xiowan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe 1736 xiowan.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 1736 xiowan.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1736 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 26 PID 1988 wrote to memory of 1736 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 26 PID 1988 wrote to memory of 1736 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 26 PID 1988 wrote to memory of 1736 1988 97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe"C:\Users\Admin\AppData\Local\Temp\97814e67ff55f9022c561484265ead595eed9d3a2e4e962a46768018a4dd7bba.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\xiowan.exe"C:\Users\Admin\xiowan.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5c34003dd55cd2a128fd8ec3aeada0187
SHA1bf901aa7a9d231efb2d12536735d0bdf6212e344
SHA256d57ed72fdf5ea794c12b56f3384c3cc385b9f93d073ce6bd9ea2c69569681734
SHA512a0d207d9174746a800df3ae4cf9301f22a2116c22c00a81a61540feb8b365b79d280424a0b0eed1285b7971f8d49486f258e37c5fb11003942a3581728517a9c
-
Filesize
320KB
MD5c34003dd55cd2a128fd8ec3aeada0187
SHA1bf901aa7a9d231efb2d12536735d0bdf6212e344
SHA256d57ed72fdf5ea794c12b56f3384c3cc385b9f93d073ce6bd9ea2c69569681734
SHA512a0d207d9174746a800df3ae4cf9301f22a2116c22c00a81a61540feb8b365b79d280424a0b0eed1285b7971f8d49486f258e37c5fb11003942a3581728517a9c
-
Filesize
320KB
MD5c34003dd55cd2a128fd8ec3aeada0187
SHA1bf901aa7a9d231efb2d12536735d0bdf6212e344
SHA256d57ed72fdf5ea794c12b56f3384c3cc385b9f93d073ce6bd9ea2c69569681734
SHA512a0d207d9174746a800df3ae4cf9301f22a2116c22c00a81a61540feb8b365b79d280424a0b0eed1285b7971f8d49486f258e37c5fb11003942a3581728517a9c
-
Filesize
320KB
MD5c34003dd55cd2a128fd8ec3aeada0187
SHA1bf901aa7a9d231efb2d12536735d0bdf6212e344
SHA256d57ed72fdf5ea794c12b56f3384c3cc385b9f93d073ce6bd9ea2c69569681734
SHA512a0d207d9174746a800df3ae4cf9301f22a2116c22c00a81a61540feb8b365b79d280424a0b0eed1285b7971f8d49486f258e37c5fb11003942a3581728517a9c