Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe
Resource
win10v2004-20220812-en
General
-
Target
23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe
-
Size
172KB
-
MD5
22bd21a160c11d4385077bf59558fb00
-
SHA1
877622fca55c2a5c383b78bb4fa7aa2b8028f6a7
-
SHA256
23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025
-
SHA512
b75864746ae865daa6b24b2642b6cdccf2c39681d406e536a282e907d05aa3a36bb5541bb38ea8a0c4d4d8bec883d8ae6f36ed1076c6b5ed32f980d137800383
-
SSDEEP
3072:VojQXp5YHeNh1nm9JuKnvmb7/D26tvJc56bzfCKpbVuugHvmDQiBuAZdv:2jQ7LNh1wMKnvmb7/D26tBc5KDCKpBuA
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pauxoem.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe -
Executes dropped EXE 1 IoCs
pid Process 1580 pauxoem.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /o" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /F" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /T" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /e" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /s" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /L" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /q" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /O" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /V" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /p" pauxoem.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /Y" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /D" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /m" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /a" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /C" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /W" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /d" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /G" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /l" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /K" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /J" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /i" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /P" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /g" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /I" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /r" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /K" 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /x" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /j" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /E" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /X" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /N" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /A" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /f" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /S" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /Q" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /H" pauxoem.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /u" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /M" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /B" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /w" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /t" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /k" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /h" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /U" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /R" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /c" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /n" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /y" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /z" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /Z" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /v" pauxoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pauxoem = "C:\\Users\\Admin\\pauxoem.exe /b" pauxoem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe 1580 pauxoem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 1580 pauxoem.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1580 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 28 PID 1224 wrote to memory of 1580 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 28 PID 1224 wrote to memory of 1580 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 28 PID 1224 wrote to memory of 1580 1224 23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe"C:\Users\Admin\AppData\Local\Temp\23ec8112b29b7f315091d3c2d26d83be760f4b1b7037b87317539bf8ee48e025.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\pauxoem.exe"C:\Users\Admin\pauxoem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD528dab11d23ed0de5e4f38a2a8b4e96d8
SHA13158499cc5f61e2773bfdbb467695b73f282a46e
SHA256a9de3b54c2101dcd3d8ae92c6b2ca0ce1472bd38f2faf09856978ca9e0845a2d
SHA512f3291b347f741ff2863bd18ada0a01b2bed42ce1b64396c823e08e15257c7b666ba7913d4a1c921f452053a478de5ec6cacaf57f33cd029558e0f88369b97db6
-
Filesize
172KB
MD528dab11d23ed0de5e4f38a2a8b4e96d8
SHA13158499cc5f61e2773bfdbb467695b73f282a46e
SHA256a9de3b54c2101dcd3d8ae92c6b2ca0ce1472bd38f2faf09856978ca9e0845a2d
SHA512f3291b347f741ff2863bd18ada0a01b2bed42ce1b64396c823e08e15257c7b666ba7913d4a1c921f452053a478de5ec6cacaf57f33cd029558e0f88369b97db6
-
Filesize
172KB
MD528dab11d23ed0de5e4f38a2a8b4e96d8
SHA13158499cc5f61e2773bfdbb467695b73f282a46e
SHA256a9de3b54c2101dcd3d8ae92c6b2ca0ce1472bd38f2faf09856978ca9e0845a2d
SHA512f3291b347f741ff2863bd18ada0a01b2bed42ce1b64396c823e08e15257c7b666ba7913d4a1c921f452053a478de5ec6cacaf57f33cd029558e0f88369b97db6
-
Filesize
172KB
MD528dab11d23ed0de5e4f38a2a8b4e96d8
SHA13158499cc5f61e2773bfdbb467695b73f282a46e
SHA256a9de3b54c2101dcd3d8ae92c6b2ca0ce1472bd38f2faf09856978ca9e0845a2d
SHA512f3291b347f741ff2863bd18ada0a01b2bed42ce1b64396c823e08e15257c7b666ba7913d4a1c921f452053a478de5ec6cacaf57f33cd029558e0f88369b97db6