Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe
Resource
win10v2004-20220901-en
General
-
Target
039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe
-
Size
276KB
-
MD5
90c17b27ee224075d35101dfd7c6a960
-
SHA1
7960df78627fde4256f8e0b482b8d137359085f8
-
SHA256
039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436
-
SHA512
a44c1fff241531d79d074e2877f08f9a7f03fdc5dc3f8b04c954bc40c41034713261e0563a7356636a3a071197b45d61e065a3edf48e4b92e5a740249df02eba
-
SSDEEP
1536:5vC89v1DLFfHk/X6tnfknHzQ0X0WytH0uL2JPWNoSfrVrBrerdrMfUVx6YBQsPm4:Q+aisPm8HuQM+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" phjiob.exe -
Executes dropped EXE 1 IoCs
pid Process 944 phjiob.exe -
Loads dropped DLL 2 IoCs
pid Process 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /T" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /e" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /C" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /Y" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /E" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /A" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /q" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /V" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /v" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /f" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /w" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /M" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /s" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /a" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /z" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /X" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /l" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /y" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /H" phjiob.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /m" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /o" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /c" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /n" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /i" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /Z" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /Q" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /r" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /D" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /j" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /G" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /k" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /B" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /O" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /J" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /F" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /d" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /N" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /W" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /L" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /g" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /h" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /P" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /R" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /K" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /x" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /t" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /S" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /b" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /p" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /I" phjiob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\phjiob = "C:\\Users\\Admin\\phjiob.exe /U" phjiob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe 944 phjiob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe 944 phjiob.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 944 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe 27 PID 1048 wrote to memory of 944 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe 27 PID 1048 wrote to memory of 944 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe 27 PID 1048 wrote to memory of 944 1048 039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe 27 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26 PID 944 wrote to memory of 1048 944 phjiob.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe"C:\Users\Admin\AppData\Local\Temp\039f3f00e5922158eb9778e5477f4e74354bc87d8d1027d2e08ef97fa62eb436.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\phjiob.exe"C:\Users\Admin\phjiob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD59764dabad6f0546a10c24b01cf47eec3
SHA1a32a9a3b6d75a0d678b61591c1f6add76167d597
SHA256dabacc5eb674d1506ba6a4a6077a14228d05f53122b3869123d21ee5c7002d72
SHA5129558faa074ff38f7469b3b50e638a2b03bb8e73e4a6ecda12a59a42d70913c7055cdee1e4ce71416e2e2f5cb7d2e3dd0dd288031611c8c4342b076d41b2028c6
-
Filesize
276KB
MD59764dabad6f0546a10c24b01cf47eec3
SHA1a32a9a3b6d75a0d678b61591c1f6add76167d597
SHA256dabacc5eb674d1506ba6a4a6077a14228d05f53122b3869123d21ee5c7002d72
SHA5129558faa074ff38f7469b3b50e638a2b03bb8e73e4a6ecda12a59a42d70913c7055cdee1e4ce71416e2e2f5cb7d2e3dd0dd288031611c8c4342b076d41b2028c6
-
Filesize
276KB
MD59764dabad6f0546a10c24b01cf47eec3
SHA1a32a9a3b6d75a0d678b61591c1f6add76167d597
SHA256dabacc5eb674d1506ba6a4a6077a14228d05f53122b3869123d21ee5c7002d72
SHA5129558faa074ff38f7469b3b50e638a2b03bb8e73e4a6ecda12a59a42d70913c7055cdee1e4ce71416e2e2f5cb7d2e3dd0dd288031611c8c4342b076d41b2028c6
-
Filesize
276KB
MD59764dabad6f0546a10c24b01cf47eec3
SHA1a32a9a3b6d75a0d678b61591c1f6add76167d597
SHA256dabacc5eb674d1506ba6a4a6077a14228d05f53122b3869123d21ee5c7002d72
SHA5129558faa074ff38f7469b3b50e638a2b03bb8e73e4a6ecda12a59a42d70913c7055cdee1e4ce71416e2e2f5cb7d2e3dd0dd288031611c8c4342b076d41b2028c6