Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe
Resource
win10v2004-20220901-en
General
-
Target
201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe
-
Size
92KB
-
MD5
82d7c0abc5f09a53dfc9178979b92d00
-
SHA1
95990398e47845b3e326d1d90d2682128ca7c668
-
SHA256
201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405
-
SHA512
5b9ccd8a1b9b3eea12867331153c4994c9519b0367bd5f7015ef1c12b3e8f28d0b7ebfcd27189f80d2ab994f70e545fbb3ffce721e9c34f4fa328d666aa0de98
-
SSDEEP
768:eweJK9nvPmaFFsH8cnW0ecO7fchJh51cTDge1VY/q45C2T1G+mt5QDbn0Pb:ewDFY8cn3ZeMaauCDbn0z
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sekec.exe -
Executes dropped EXE 1 IoCs
pid Process 980 sekec.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /m" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /W" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /f" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /w" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /M" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /C" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /r" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /d" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /x" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /e" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /J" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /s" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /R" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /H" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /z" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /L" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /S" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /I" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /K" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /F" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /n" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /P" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /T" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /q" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /t" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /p" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /u" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /U" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /v" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /Y" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /c" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /O" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /b" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /l" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /G" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /Z" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /A" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /o" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /h" sekec.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /a" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /Q" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /B" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /V" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /k" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /j" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /g" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /X" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /i" sekec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\sekec = "C:\\Users\\Admin\\sekec.exe /D" sekec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe 980 sekec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe 980 sekec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 980 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe 28 PID 1900 wrote to memory of 980 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe 28 PID 1900 wrote to memory of 980 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe 28 PID 1900 wrote to memory of 980 1900 201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe 28 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7 PID 980 wrote to memory of 1900 980 sekec.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe"C:\Users\Admin\AppData\Local\Temp\201fc659a2af447a0f3fa21433216206ec6e0f56e452b976d8b9330dc0ff5405.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\sekec.exe"C:\Users\Admin\sekec.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5cc2c38879c65ace9da3e9dae50dfae89
SHA10e3efd4bb83ab9014cbbfc5b993fff01f56531c7
SHA256f770f5b8d33708b663857dcca711074882c17e0e50a6dd2f96a23c5e017bb60d
SHA5125b38118b05f0118b0fd6a5202011140418658abb550cbe7a334ddb6f45367708806f9002e98dfef0b7f8f0b10240ce5f4fadcdf30da3437f8cc35a4bf3c506b6
-
Filesize
92KB
MD5cc2c38879c65ace9da3e9dae50dfae89
SHA10e3efd4bb83ab9014cbbfc5b993fff01f56531c7
SHA256f770f5b8d33708b663857dcca711074882c17e0e50a6dd2f96a23c5e017bb60d
SHA5125b38118b05f0118b0fd6a5202011140418658abb550cbe7a334ddb6f45367708806f9002e98dfef0b7f8f0b10240ce5f4fadcdf30da3437f8cc35a4bf3c506b6
-
Filesize
92KB
MD5cc2c38879c65ace9da3e9dae50dfae89
SHA10e3efd4bb83ab9014cbbfc5b993fff01f56531c7
SHA256f770f5b8d33708b663857dcca711074882c17e0e50a6dd2f96a23c5e017bb60d
SHA5125b38118b05f0118b0fd6a5202011140418658abb550cbe7a334ddb6f45367708806f9002e98dfef0b7f8f0b10240ce5f4fadcdf30da3437f8cc35a4bf3c506b6
-
Filesize
92KB
MD5cc2c38879c65ace9da3e9dae50dfae89
SHA10e3efd4bb83ab9014cbbfc5b993fff01f56531c7
SHA256f770f5b8d33708b663857dcca711074882c17e0e50a6dd2f96a23c5e017bb60d
SHA5125b38118b05f0118b0fd6a5202011140418658abb550cbe7a334ddb6f45367708806f9002e98dfef0b7f8f0b10240ce5f4fadcdf30da3437f8cc35a4bf3c506b6