Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe
Resource
win10v2004-20220812-en
General
-
Target
0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe
-
Size
509KB
-
MD5
799272d844e730a754dcb56381f695d0
-
SHA1
7bb287e07fd8cc5248a90984dfcbc46f331c3062
-
SHA256
0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97
-
SHA512
3559053d05ccb227c305d6f82cc23b22426a0338a079cdca7c5814179c2e8c04ead778f35f91d5e1ca32bedc82bd5123b7edbb83f585673d35154881a6df3bee
-
SSDEEP
12288:jgDhdkq5BCoC5LfWSLTUQpr2Zu19Qm7zN:jgDhdkMRWfLTUO2Zu1um7zN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe scvshosts.exe" 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\scvshosts.exe" 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\o: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\w: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\a: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\b: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\j: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\l: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\y: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\f: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\i: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\m: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\q: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\s: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\t: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\u: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\v: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\e: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\h: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\k: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\n: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\p: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\r: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\x: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened (read-only) \??\z: 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/996-61-0x0000000000400000-0x00000000004A3000-memory.dmp autoit_exe behavioral1/memory/996-62-0x0000000000400000-0x00000000004A3000-memory.dmp autoit_exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\autorun.ini 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File created C:\Windows\SysWOW64\setting.ini 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened for modification C:\Windows\SysWOW64\setting.ini 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File created C:\Windows\SysWOW64\scvshosts.exe 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened for modification C:\Windows\SysWOW64\scvshosts.exe 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File created C:\Windows\SysWOW64\blastclnnn.exe 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened for modification C:\Windows\SysWOW64\blastclnnn.exe 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\hinhem.scr 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File created C:\Windows\scvshosts.exe 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe File opened for modification C:\Windows\scvshosts.exe 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 996 wrote to memory of 1640 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 27 PID 996 wrote to memory of 1640 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 27 PID 996 wrote to memory of 1640 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 27 PID 996 wrote to memory of 1640 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 27 PID 1640 wrote to memory of 276 1640 cmd.exe 29 PID 1640 wrote to memory of 276 1640 cmd.exe 29 PID 1640 wrote to memory of 276 1640 cmd.exe 29 PID 1640 wrote to memory of 276 1640 cmd.exe 29 PID 996 wrote to memory of 1652 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 30 PID 996 wrote to memory of 1652 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 30 PID 996 wrote to memory of 1652 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 30 PID 996 wrote to memory of 1652 996 0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe 30 PID 1652 wrote to memory of 1144 1652 cmd.exe 32 PID 1652 wrote to memory of 1144 1652 cmd.exe 32 PID 1652 wrote to memory of 1144 1652 cmd.exe 32 PID 1652 wrote to memory of 1144 1652 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe"C:\Users\Admin\AppData\Local\Temp\0f82e7f3277a2304e92d43bef14210bcb039f111c35b5672d130f7ceae80cb97.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe3⤵PID:1144
-
-