Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe
Resource
win10v2004-20220812-en
General
-
Target
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe
-
Size
124KB
-
MD5
a09eb46856114a07dc7aad6d36b4cb10
-
SHA1
b048471389788cab01b80b9a103057f8b33fe268
-
SHA256
72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7
-
SHA512
a405f492d46d8bc36669da26e671cc20d84a7744c2d0a51312bed5fd2f315bf548d9dc3d02ad587a5fb149f0932c4ca8ad1f838f94e8a32bec3199af207456c7
-
SSDEEP
1536:zztkjQTQ9U0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VeRPNeG0h/y:1kj39U0GgAT9QIq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hacec.exe -
Executes dropped EXE 1 IoCs
pid Process 1220 hacec.exe -
Loads dropped DLL 2 IoCs
pid Process 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /O" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /H" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /I" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /m" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /T" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /q" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /N" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /n" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /K" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /y" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /k" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /x" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /W" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /M" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /F" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /p" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /K" 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /g" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /D" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /R" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /j" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /Q" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /t" hacec.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /u" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /L" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /o" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /U" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /l" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /Z" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /d" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /a" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /i" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /X" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /S" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /f" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /G" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /B" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /h" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /V" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /r" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /e" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /E" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /A" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /b" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /C" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /J" hacec.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /v" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /s" hacec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\hacec = "C:\\Users\\Admin\\hacec.exe /Y" hacec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe 1220 hacec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 1220 hacec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1220 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 27 PID 1628 wrote to memory of 1220 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 27 PID 1628 wrote to memory of 1220 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 27 PID 1628 wrote to memory of 1220 1628 72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe"C:\Users\Admin\AppData\Local\Temp\72ad212d8a3f87b4b7fa00ed1523b428f2df745c82f2d8852777c897229ce4b7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\hacec.exe"C:\Users\Admin\hacec.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5191b17d3351fafa2e62fbea0d8c82c66
SHA1e923d10bdd9e52b9590386f49724d43732fe83ea
SHA2565e5f4e24e51bef5cec50dd48d040cec873c8f99907b4bdc6330e427547e87f92
SHA51223f68e88f57b1079660ab872e37d6f6c4fa67f5cfc48f1471c20c39738bbd6064e16a0987c2fb0e8509f0f42da9df6d040c2d4436c9cd8cacc339c10dd5e9878
-
Filesize
124KB
MD5191b17d3351fafa2e62fbea0d8c82c66
SHA1e923d10bdd9e52b9590386f49724d43732fe83ea
SHA2565e5f4e24e51bef5cec50dd48d040cec873c8f99907b4bdc6330e427547e87f92
SHA51223f68e88f57b1079660ab872e37d6f6c4fa67f5cfc48f1471c20c39738bbd6064e16a0987c2fb0e8509f0f42da9df6d040c2d4436c9cd8cacc339c10dd5e9878
-
Filesize
124KB
MD5191b17d3351fafa2e62fbea0d8c82c66
SHA1e923d10bdd9e52b9590386f49724d43732fe83ea
SHA2565e5f4e24e51bef5cec50dd48d040cec873c8f99907b4bdc6330e427547e87f92
SHA51223f68e88f57b1079660ab872e37d6f6c4fa67f5cfc48f1471c20c39738bbd6064e16a0987c2fb0e8509f0f42da9df6d040c2d4436c9cd8cacc339c10dd5e9878
-
Filesize
124KB
MD5191b17d3351fafa2e62fbea0d8c82c66
SHA1e923d10bdd9e52b9590386f49724d43732fe83ea
SHA2565e5f4e24e51bef5cec50dd48d040cec873c8f99907b4bdc6330e427547e87f92
SHA51223f68e88f57b1079660ab872e37d6f6c4fa67f5cfc48f1471c20c39738bbd6064e16a0987c2fb0e8509f0f42da9df6d040c2d4436c9cd8cacc339c10dd5e9878