Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe
Resource
win10v2004-20220812-en
General
-
Target
2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe
-
Size
228KB
-
MD5
830160e0fe467f38031bbf1d595eab40
-
SHA1
6d850516aa58a42303001c3b926a1a61db0f097d
-
SHA256
2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5
-
SHA512
2aeb4550739c29777e0e9e9cc52533938b2096e24dfef85c7e5abe53e53b298e3557f2690a7326bc7b0bd2a8b2c6548d1ea02a4f1d9aeafd812d5718d7de5fa0
-
SSDEEP
6144:h+tFwzWQM2+OMcppIRW30d+h8wZ2Uf/T11cradKtvr1K/fObT/bGipKgJJeZ4cAe:KFw8OMcppIRW3M+hwUf/Z1craduvr1KZ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" naiduz.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 naiduz.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /D" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /t" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /Q" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /B" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /U" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /g" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /F" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /e" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /C" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /g" 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /l" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /p" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /X" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /A" naiduz.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /u" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /J" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /H" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /c" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /G" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /I" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /f" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /s" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /m" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /n" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /Y" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /x" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /S" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /i" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /q" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /O" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /k" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /o" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /j" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /h" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /d" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /P" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /r" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /w" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /M" naiduz.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /V" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /K" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /a" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /R" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /N" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /v" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /Z" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /W" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /y" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /E" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /T" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /L" naiduz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\naiduz = "C:\\Users\\Admin\\naiduz.exe /b" naiduz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe 1464 naiduz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 1464 naiduz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1464 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 28 PID 1736 wrote to memory of 1464 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 28 PID 1736 wrote to memory of 1464 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 28 PID 1736 wrote to memory of 1464 1736 2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe"C:\Users\Admin\AppData\Local\Temp\2906770839b2b7fd89e29f1a5f434ea66f09e61d28893e7812b1219f3289e6e5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\naiduz.exe"C:\Users\Admin\naiduz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5b27c3c3eae0b7faf6e628342ccbc7e15
SHA18570c5b5bf596857b44d1dd0594f39d88bcc88b8
SHA256c13494826cde43114a5f755874a72f1333c44cbf173f6f4145fcda8908dbc44c
SHA5122f01da3ad1203a4bede3d2363d5bef073cb97654f502843222db2fdca6995399ba3c4b679f3b95a26f118858ace501caa928cdc834e38034586bdefe5bb08347
-
Filesize
228KB
MD5b27c3c3eae0b7faf6e628342ccbc7e15
SHA18570c5b5bf596857b44d1dd0594f39d88bcc88b8
SHA256c13494826cde43114a5f755874a72f1333c44cbf173f6f4145fcda8908dbc44c
SHA5122f01da3ad1203a4bede3d2363d5bef073cb97654f502843222db2fdca6995399ba3c4b679f3b95a26f118858ace501caa928cdc834e38034586bdefe5bb08347
-
Filesize
228KB
MD5b27c3c3eae0b7faf6e628342ccbc7e15
SHA18570c5b5bf596857b44d1dd0594f39d88bcc88b8
SHA256c13494826cde43114a5f755874a72f1333c44cbf173f6f4145fcda8908dbc44c
SHA5122f01da3ad1203a4bede3d2363d5bef073cb97654f502843222db2fdca6995399ba3c4b679f3b95a26f118858ace501caa928cdc834e38034586bdefe5bb08347
-
Filesize
228KB
MD5b27c3c3eae0b7faf6e628342ccbc7e15
SHA18570c5b5bf596857b44d1dd0594f39d88bcc88b8
SHA256c13494826cde43114a5f755874a72f1333c44cbf173f6f4145fcda8908dbc44c
SHA5122f01da3ad1203a4bede3d2363d5bef073cb97654f502843222db2fdca6995399ba3c4b679f3b95a26f118858ace501caa928cdc834e38034586bdefe5bb08347