Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe
Resource
win10v2004-20220901-en
General
-
Target
0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe
-
Size
139KB
-
MD5
a1a8f6c34af3ddeeb23ddbab1b8c9448
-
SHA1
c6c76a323a744b980976a46a6f6929e975391bb6
-
SHA256
0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e
-
SHA512
f2266ee842c2387d66ee5fa7d7aa0378f8de24afbd05fd7015d2de2fb444c3e3c3223f61f1e18d655a9c0459738464b87330bc652a6d919cc2949b56cbd7d726
-
SSDEEP
3072:/T+weJQEgCyX/nniZQZLOds8YU1OoJytpk:fI1gC+niZyqds8YI0E
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nuaurux.exe -
Executes dropped EXE 2 IoCs
pid Process 2040 nuaurux.exe 1360 nuaurux.exe -
Loads dropped DLL 2 IoCs
pid Process 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /q" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /r" 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /b" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /v" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /h" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /k" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /i" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /r" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /j" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /a" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /d" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /p" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /y" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /z" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /o" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /t" nuaurux.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /u" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /s" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /f" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /x" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /n" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /g" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /c" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /e" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /l" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /m" nuaurux.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuaurux = "C:\\Users\\Admin\\nuaurux.exe /w" nuaurux.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum nuaurux.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 nuaurux.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf nuaurux.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1100 set thread context of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 2040 set thread context of 1360 2040 nuaurux.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe 1360 nuaurux.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 2040 nuaurux.exe 1360 nuaurux.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 1100 wrote to memory of 900 1100 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 27 PID 900 wrote to memory of 2040 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 28 PID 900 wrote to memory of 2040 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 28 PID 900 wrote to memory of 2040 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 28 PID 900 wrote to memory of 2040 900 0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe 28 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29 PID 2040 wrote to memory of 1360 2040 nuaurux.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe"C:\Users\Admin\AppData\Local\Temp\0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\0831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\nuaurux.exe"C:\Users\Admin\nuaurux.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\nuaurux.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5a1a8f6c34af3ddeeb23ddbab1b8c9448
SHA1c6c76a323a744b980976a46a6f6929e975391bb6
SHA2560831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e
SHA512f2266ee842c2387d66ee5fa7d7aa0378f8de24afbd05fd7015d2de2fb444c3e3c3223f61f1e18d655a9c0459738464b87330bc652a6d919cc2949b56cbd7d726
-
Filesize
139KB
MD5a1a8f6c34af3ddeeb23ddbab1b8c9448
SHA1c6c76a323a744b980976a46a6f6929e975391bb6
SHA2560831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e
SHA512f2266ee842c2387d66ee5fa7d7aa0378f8de24afbd05fd7015d2de2fb444c3e3c3223f61f1e18d655a9c0459738464b87330bc652a6d919cc2949b56cbd7d726
-
Filesize
139KB
MD5a1a8f6c34af3ddeeb23ddbab1b8c9448
SHA1c6c76a323a744b980976a46a6f6929e975391bb6
SHA2560831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e
SHA512f2266ee842c2387d66ee5fa7d7aa0378f8de24afbd05fd7015d2de2fb444c3e3c3223f61f1e18d655a9c0459738464b87330bc652a6d919cc2949b56cbd7d726
-
Filesize
139KB
MD5a1a8f6c34af3ddeeb23ddbab1b8c9448
SHA1c6c76a323a744b980976a46a6f6929e975391bb6
SHA2560831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e
SHA512f2266ee842c2387d66ee5fa7d7aa0378f8de24afbd05fd7015d2de2fb444c3e3c3223f61f1e18d655a9c0459738464b87330bc652a6d919cc2949b56cbd7d726
-
Filesize
139KB
MD5a1a8f6c34af3ddeeb23ddbab1b8c9448
SHA1c6c76a323a744b980976a46a6f6929e975391bb6
SHA2560831143154a34f6caec8309f1b8efb02b30ba03c113f372f68fe920cdf85f91e
SHA512f2266ee842c2387d66ee5fa7d7aa0378f8de24afbd05fd7015d2de2fb444c3e3c3223f61f1e18d655a9c0459738464b87330bc652a6d919cc2949b56cbd7d726