Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe
Resource
win10v2004-20220812-en
General
-
Target
c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe
-
Size
124KB
-
MD5
48dda9ece40fc1cd4f836329fbe44b1f
-
SHA1
7b7a5b1cbe117806cc9784e7fd93b55d3dbe0c77
-
SHA256
c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c
-
SHA512
3c054c8e3d644267968dfeccf91fc54cf2b897a35950a6a5ab0740338bc61035e46b26cc03263f0cc31680bf24b1293449e02f5f84f5dd338c71b8b579273616
-
SSDEEP
1536:yHQK12C+WZSu+FOYqUWmatkSJrpVJzMqGN/5sfqDaiwq6H10q:ycCbZSukOY8hrJFVNM/N/5sfqDfwqpq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yulun.exe -
Executes dropped EXE 1 IoCs
pid Process 1548 yulun.exe -
Loads dropped DLL 2 IoCs
pid Process 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /w" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /M" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /A" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /H" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /V" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /o" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /D" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /z" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /B" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /t" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /K" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /U" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /f" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /e" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /I" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /y" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /R" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /j" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /a" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /q" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /g" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /h" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /b" yulun.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /V" c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /s" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /J" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /x" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /C" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /p" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /G" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /c" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /L" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /W" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /E" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /v" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /Y" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /O" yulun.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /P" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /F" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /k" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /d" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /l" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /N" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /Z" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /u" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /X" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /n" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /m" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /S" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /T" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /r" yulun.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\yulun = "C:\\Users\\Admin\\yulun.exe /i" yulun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe 1548 yulun.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 1548 yulun.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1548 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 26 PID 1452 wrote to memory of 1548 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 26 PID 1452 wrote to memory of 1548 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 26 PID 1452 wrote to memory of 1548 1452 c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe"C:\Users\Admin\AppData\Local\Temp\c32654d3558e01b1785f603b706ea1fc3c07e0965a9b5c22a4e7a0761e4bff4c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\yulun.exe"C:\Users\Admin\yulun.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5735721b8aef2fcdf4277d1648a343597
SHA1b024ab8baebf105f4939c9f145fb9a9f5cf333f2
SHA256e22eabf8e234aa09d26a08fc99f2328f8f1fe500d34277828deb1d8d4d4ca29d
SHA512551557e84e528bbcb7a7baba61cb0470fb154ab243a12da6a6687207e73d76711b0510a559dbfec642f5ce17fd20fffc6509e3bedf9c557b8ec0221430b2b62b
-
Filesize
124KB
MD5735721b8aef2fcdf4277d1648a343597
SHA1b024ab8baebf105f4939c9f145fb9a9f5cf333f2
SHA256e22eabf8e234aa09d26a08fc99f2328f8f1fe500d34277828deb1d8d4d4ca29d
SHA512551557e84e528bbcb7a7baba61cb0470fb154ab243a12da6a6687207e73d76711b0510a559dbfec642f5ce17fd20fffc6509e3bedf9c557b8ec0221430b2b62b
-
Filesize
124KB
MD5735721b8aef2fcdf4277d1648a343597
SHA1b024ab8baebf105f4939c9f145fb9a9f5cf333f2
SHA256e22eabf8e234aa09d26a08fc99f2328f8f1fe500d34277828deb1d8d4d4ca29d
SHA512551557e84e528bbcb7a7baba61cb0470fb154ab243a12da6a6687207e73d76711b0510a559dbfec642f5ce17fd20fffc6509e3bedf9c557b8ec0221430b2b62b
-
Filesize
124KB
MD5735721b8aef2fcdf4277d1648a343597
SHA1b024ab8baebf105f4939c9f145fb9a9f5cf333f2
SHA256e22eabf8e234aa09d26a08fc99f2328f8f1fe500d34277828deb1d8d4d4ca29d
SHA512551557e84e528bbcb7a7baba61cb0470fb154ab243a12da6a6687207e73d76711b0510a559dbfec642f5ce17fd20fffc6509e3bedf9c557b8ec0221430b2b62b