Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe
Resource
win10v2004-20220812-en
General
-
Target
9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe
-
Size
224KB
-
MD5
825269921503dbc03e3a58b466064bc2
-
SHA1
21ef1a4138aa8c209bd816a6e69ef33161423e1c
-
SHA256
9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325
-
SHA512
fdcbb3176866a1817e18bbcc66bb8f576a0165218ce6bdca20e3a6e0654c062bbef70d1455d0a99330e088c25b89e0a6144fadd26f4c68127d14ee865b30995e
-
SSDEEP
3072:vXyqNsMoBuNMZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2W:6qN5ep4LnbmlrZ3y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" paolav.exe -
Executes dropped EXE 1 IoCs
pid Process 2076 paolav.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /b" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /m" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /i" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /p" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /k" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /q" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /w" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /o" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /u" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /l" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /h" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /c" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /a" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /e" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /d" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /b" 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /x" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /v" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /g" paolav.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /s" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /j" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /y" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /t" paolav.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /z" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /f" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /r" paolav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\paolav = "C:\\Users\\Admin\\paolav.exe /n" paolav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4656 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe 4656 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe 2076 paolav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4656 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe 2076 paolav.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2076 4656 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe 82 PID 4656 wrote to memory of 2076 4656 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe 82 PID 4656 wrote to memory of 2076 4656 9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe"C:\Users\Admin\AppData\Local\Temp\9aa8d3e3215254b3feeac4c57c45c8a75240ede9f8b87ca15ff4175c24ce0325.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\paolav.exe"C:\Users\Admin\paolav.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5c89fd48b7675ffd259ca31198fc84792
SHA1b538ff6564eb595cea3df28afb08057ba3c070f8
SHA25697c120ac8961335713e4dba3ea46c28ea9c197921cf7d1eb2a95fbb5c9ee27ef
SHA5127b5de6898721bf1712582d96cbd178d86973c563ecc441e65bfe9d99c436fa9f2aa26315ec7840eb1063531c36e09c3c1a45696ec4c054aa6a8891b2e6ebf005
-
Filesize
224KB
MD5c89fd48b7675ffd259ca31198fc84792
SHA1b538ff6564eb595cea3df28afb08057ba3c070f8
SHA25697c120ac8961335713e4dba3ea46c28ea9c197921cf7d1eb2a95fbb5c9ee27ef
SHA5127b5de6898721bf1712582d96cbd178d86973c563ecc441e65bfe9d99c436fa9f2aa26315ec7840eb1063531c36e09c3c1a45696ec4c054aa6a8891b2e6ebf005