Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe
Resource
win10v2004-20220812-en
General
-
Target
90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe
-
Size
168KB
-
MD5
824efcfcd85567ef27ecb237792454e0
-
SHA1
6376cd2eb356ef92c62e0406135478d1fb8a4fbb
-
SHA256
90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd
-
SHA512
9d24e021d0b8cc8a4c06c5d04a28d2db0cf744064507e6a880a56e4c6e2e1cbf30fd1851d84d4f3c9954b403daf7ae0d7670cb16b8c9f6526733204afe7b992d
-
SSDEEP
3072:ShGs8x8OY7SIsyvTlo/11hJl2czGRqxZdxxW97I2:ShGDx8OYiQlS1NJG6/xg
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaanu.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 zaanu.exe -
Loads dropped DLL 2 IoCs
pid Process 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /b" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /K" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /B" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /o" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /s" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /S" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /D" zaanu.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /e" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /w" zaanu.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /R" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /A" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /v" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /F" 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /C" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /d" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /c" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /q" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /h" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /F" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /W" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /V" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /r" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /t" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /E" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /H" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /i" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /P" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /k" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /a" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /l" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /Y" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /M" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /x" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /u" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /O" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /j" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /z" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /U" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /N" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /X" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /y" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /g" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /Q" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /J" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /L" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /Z" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /n" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /G" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /f" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /p" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /m" zaanu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaanu = "C:\\Users\\Admin\\zaanu.exe /I" zaanu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe 1160 zaanu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 1160 zaanu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1160 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 27 PID 1468 wrote to memory of 1160 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 27 PID 1468 wrote to memory of 1160 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 27 PID 1468 wrote to memory of 1160 1468 90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe"C:\Users\Admin\AppData\Local\Temp\90466712d0549771a8e5f812e5238068bdb76ad8107b552f726748739cf622bd.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\zaanu.exe"C:\Users\Admin\zaanu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5beab4fcb3577215ca35f5654798e6ddd
SHA138a1f3313269f47916e4cebfc16fc1d41fa60592
SHA25604fd488ea2a4492c30e04aa1a8431f338bd5ec7afcac2c932b42f9b7d3ed7732
SHA51284a40a0fc1d83f35656cb21fca5a74b8e02ae67ba7d5cb609af964b767e3f9ccf2f6ccc8c5459f567dd41989335bf103c1abdc403956a5d64f02023e1d8eb965
-
Filesize
168KB
MD5beab4fcb3577215ca35f5654798e6ddd
SHA138a1f3313269f47916e4cebfc16fc1d41fa60592
SHA25604fd488ea2a4492c30e04aa1a8431f338bd5ec7afcac2c932b42f9b7d3ed7732
SHA51284a40a0fc1d83f35656cb21fca5a74b8e02ae67ba7d5cb609af964b767e3f9ccf2f6ccc8c5459f567dd41989335bf103c1abdc403956a5d64f02023e1d8eb965
-
Filesize
168KB
MD5beab4fcb3577215ca35f5654798e6ddd
SHA138a1f3313269f47916e4cebfc16fc1d41fa60592
SHA25604fd488ea2a4492c30e04aa1a8431f338bd5ec7afcac2c932b42f9b7d3ed7732
SHA51284a40a0fc1d83f35656cb21fca5a74b8e02ae67ba7d5cb609af964b767e3f9ccf2f6ccc8c5459f567dd41989335bf103c1abdc403956a5d64f02023e1d8eb965
-
Filesize
168KB
MD5beab4fcb3577215ca35f5654798e6ddd
SHA138a1f3313269f47916e4cebfc16fc1d41fa60592
SHA25604fd488ea2a4492c30e04aa1a8431f338bd5ec7afcac2c932b42f9b7d3ed7732
SHA51284a40a0fc1d83f35656cb21fca5a74b8e02ae67ba7d5cb609af964b767e3f9ccf2f6ccc8c5459f567dd41989335bf103c1abdc403956a5d64f02023e1d8eb965