Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe
Resource
win10v2004-20220812-en
General
-
Target
fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe
-
Size
336KB
-
MD5
773df99210aaf6ed1fe883e8dd2ab170
-
SHA1
8ee8317dcbbf9662db6509e270a7bdb0dd91f3e4
-
SHA256
fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31
-
SHA512
29ba37d9722670a26964166a12903b29609f9d8edf9c96503546733bfa6f784da65a691d40a9eae170d9ec7b9b26cfe6f1b7f5bc89bc3c5b572340d0a62731cb
-
SSDEEP
6144:XDNxXC2WGk1Y3nmQcuyKx5DKEJrwavj9+dU5S5Nn:Tu2WGk1Y3nmQcjKvWEJK5
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoiuy.exe -
Executes dropped EXE 1 IoCs
pid Process 1396 xoiuy.exe -
Loads dropped DLL 2 IoCs
pid Process 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /g" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /s" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /f" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /q" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /t" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /p" fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /a" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /z" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /o" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /v" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /r" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /e" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /c" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /l" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /x" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /n" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /y" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /h" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /i" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /p" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /b" xoiuy.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /k" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /m" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /u" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /d" xoiuy.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /w" xoiuy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\xoiuy = "C:\\Users\\Admin\\xoiuy.exe /j" xoiuy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe 1396 xoiuy.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 1396 xoiuy.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1396 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 27 PID 1692 wrote to memory of 1396 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 27 PID 1692 wrote to memory of 1396 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 27 PID 1692 wrote to memory of 1396 1692 fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe"C:\Users\Admin\AppData\Local\Temp\fc7b352383a275db00a4ba2f52f66b449019f412d9dcdcda91d6069ef4f40d31.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\xoiuy.exe"C:\Users\Admin\xoiuy.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD594b9280e9d821808024ff398a61d6175
SHA16226f7edb793f1861896d8a79c33de0846e7f3b2
SHA256b90083f84a0fe19431b19e394ad6fdbd84f8fc6f795d1a938c49787c9092b5b7
SHA5121657ffd1494fede64b2401aa8bac754132d753dd2f036d36c147c6878ccae2783076a0ad4597461ad46e69ba33a10332ecbb493204b004116d8aa73df4e8d0f5
-
Filesize
336KB
MD594b9280e9d821808024ff398a61d6175
SHA16226f7edb793f1861896d8a79c33de0846e7f3b2
SHA256b90083f84a0fe19431b19e394ad6fdbd84f8fc6f795d1a938c49787c9092b5b7
SHA5121657ffd1494fede64b2401aa8bac754132d753dd2f036d36c147c6878ccae2783076a0ad4597461ad46e69ba33a10332ecbb493204b004116d8aa73df4e8d0f5
-
Filesize
336KB
MD594b9280e9d821808024ff398a61d6175
SHA16226f7edb793f1861896d8a79c33de0846e7f3b2
SHA256b90083f84a0fe19431b19e394ad6fdbd84f8fc6f795d1a938c49787c9092b5b7
SHA5121657ffd1494fede64b2401aa8bac754132d753dd2f036d36c147c6878ccae2783076a0ad4597461ad46e69ba33a10332ecbb493204b004116d8aa73df4e8d0f5
-
Filesize
336KB
MD594b9280e9d821808024ff398a61d6175
SHA16226f7edb793f1861896d8a79c33de0846e7f3b2
SHA256b90083f84a0fe19431b19e394ad6fdbd84f8fc6f795d1a938c49787c9092b5b7
SHA5121657ffd1494fede64b2401aa8bac754132d753dd2f036d36c147c6878ccae2783076a0ad4597461ad46e69ba33a10332ecbb493204b004116d8aa73df4e8d0f5