Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe
Resource
win10v2004-20220812-en
General
-
Target
03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe
-
Size
80KB
-
MD5
2b7c00a4bc6d0d0889fd49a7739384c9
-
SHA1
d042cf35f1baed92599b13ce63b6cb99d1fe6738
-
SHA256
03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f
-
SHA512
f8777c3a7d83b497cb3820d226a038c39a3fc9d5da4472aee96a4d48cac160ce7c11c36fe469902fd20517c5d7fc27b3c50a5c21a4f7433311204232c930f696
-
SSDEEP
1536:Iqm7Fi5jihZ0Y9s51p1xYtWghO6mC0BuIWX2QdCWH/fCVPJV4gWzAi7oXBtW30Ru:6I5jiDFs51p1xYtWghO6mC0BuIWX2Qd7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" goazuuv.exe -
Executes dropped EXE 1 IoCs
pid Process 1868 goazuuv.exe -
Loads dropped DLL 2 IoCs
pid Process 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ goazuuv.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\goazuuv = "C:\\Users\\Admin\\goazuuv.exe" goazuuv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe 1868 goazuuv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe 1868 goazuuv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 1868 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe 27 PID 960 wrote to memory of 1868 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe 27 PID 960 wrote to memory of 1868 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe 27 PID 960 wrote to memory of 1868 960 03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe 27 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26 PID 1868 wrote to memory of 960 1868 goazuuv.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe"C:\Users\Admin\AppData\Local\Temp\03a4759d6259a0e544bbfca79d0f1a546097f1890e4e2a7e12d2f17c80cd6c6f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\goazuuv.exe"C:\Users\Admin\goazuuv.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5d62f8ce21a093fa994a116b6a2db3e3d
SHA1b7ad7c639adab737d2ad5a532c5d97ad6cd5adce
SHA256fdda77eac6b614de499e42eb7307207e77849866b31480d81d8107a28317771f
SHA512cc665063adc41ee10ff3fcca892c4e8416151298ab364551819fc48dccd977a940636fb3bde95796399dd38975037ae1e3921bc6fa4f4a8b285c0a23dcdcdb52
-
Filesize
80KB
MD5d62f8ce21a093fa994a116b6a2db3e3d
SHA1b7ad7c639adab737d2ad5a532c5d97ad6cd5adce
SHA256fdda77eac6b614de499e42eb7307207e77849866b31480d81d8107a28317771f
SHA512cc665063adc41ee10ff3fcca892c4e8416151298ab364551819fc48dccd977a940636fb3bde95796399dd38975037ae1e3921bc6fa4f4a8b285c0a23dcdcdb52
-
Filesize
80KB
MD5d62f8ce21a093fa994a116b6a2db3e3d
SHA1b7ad7c639adab737d2ad5a532c5d97ad6cd5adce
SHA256fdda77eac6b614de499e42eb7307207e77849866b31480d81d8107a28317771f
SHA512cc665063adc41ee10ff3fcca892c4e8416151298ab364551819fc48dccd977a940636fb3bde95796399dd38975037ae1e3921bc6fa4f4a8b285c0a23dcdcdb52
-
Filesize
80KB
MD5d62f8ce21a093fa994a116b6a2db3e3d
SHA1b7ad7c639adab737d2ad5a532c5d97ad6cd5adce
SHA256fdda77eac6b614de499e42eb7307207e77849866b31480d81d8107a28317771f
SHA512cc665063adc41ee10ff3fcca892c4e8416151298ab364551819fc48dccd977a940636fb3bde95796399dd38975037ae1e3921bc6fa4f4a8b285c0a23dcdcdb52