Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe
Resource
win10v2004-20220901-en
General
-
Target
79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe
-
Size
192KB
-
MD5
916e6119881bff5e67a0610e2b6c0040
-
SHA1
0b867372e9e0b1a2d3cf2e4c5eb7d4f4c84402b0
-
SHA256
79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b
-
SHA512
43fffdf0d5e368d1adde1d7e75d13bc9fb8febc3626e3523f1f6f44a1899e287816a564ff4f28e7654903a72853ce2688b49f29784a06b86f60e28f33f8842fa
-
SSDEEP
3072:4dYLIxdvKuGr7t5qCRFSoRQg/yqOV9Kf5L/SV5qK:NiVCRFSoRQlVC5L/hK
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lzkum.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 lzkum.exe -
Loads dropped DLL 2 IoCs
pid Process 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /d" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /c" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /o" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /a" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /l" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /x" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /k" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /q" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /y" lzkum.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /z" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /f" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /r" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /n" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /t" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /w" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /e" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /g" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /d" 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /u" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /m" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /h" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /b" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /j" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /v" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /p" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /s" lzkum.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\lzkum = "C:\\Users\\Admin\\lzkum.exe /i" lzkum.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe 2028 lzkum.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 2028 lzkum.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 576 wrote to memory of 2028 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 26 PID 576 wrote to memory of 2028 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 26 PID 576 wrote to memory of 2028 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 26 PID 576 wrote to memory of 2028 576 79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe"C:\Users\Admin\AppData\Local\Temp\79d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\lzkum.exe"C:\Users\Admin\lzkum.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5916e6119881bff5e67a0610e2b6c0040
SHA10b867372e9e0b1a2d3cf2e4c5eb7d4f4c84402b0
SHA25679d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b
SHA51243fffdf0d5e368d1adde1d7e75d13bc9fb8febc3626e3523f1f6f44a1899e287816a564ff4f28e7654903a72853ce2688b49f29784a06b86f60e28f33f8842fa
-
Filesize
192KB
MD5916e6119881bff5e67a0610e2b6c0040
SHA10b867372e9e0b1a2d3cf2e4c5eb7d4f4c84402b0
SHA25679d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b
SHA51243fffdf0d5e368d1adde1d7e75d13bc9fb8febc3626e3523f1f6f44a1899e287816a564ff4f28e7654903a72853ce2688b49f29784a06b86f60e28f33f8842fa
-
Filesize
192KB
MD5916e6119881bff5e67a0610e2b6c0040
SHA10b867372e9e0b1a2d3cf2e4c5eb7d4f4c84402b0
SHA25679d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b
SHA51243fffdf0d5e368d1adde1d7e75d13bc9fb8febc3626e3523f1f6f44a1899e287816a564ff4f28e7654903a72853ce2688b49f29784a06b86f60e28f33f8842fa
-
Filesize
192KB
MD5916e6119881bff5e67a0610e2b6c0040
SHA10b867372e9e0b1a2d3cf2e4c5eb7d4f4c84402b0
SHA25679d61b801a51448382f5c030639c242b6e9d22157ccdaa51cf5790469a242b3b
SHA51243fffdf0d5e368d1adde1d7e75d13bc9fb8febc3626e3523f1f6f44a1899e287816a564ff4f28e7654903a72853ce2688b49f29784a06b86f60e28f33f8842fa