Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe
Resource
win10v2004-20220812-en
General
-
Target
6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe
-
Size
188KB
-
MD5
091b857bf7f5ca1c875a68ace871e8c3
-
SHA1
25e4af8be0e3517371fcfb73e25c78a2c6556287
-
SHA256
6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89
-
SHA512
7c8661a36b702cc6f83ee98d3b4bd8043d8d323798d7671d6da37976b879fa5dd8f520452f6b1892791e54776a8e6880cef2904483f7f8d55d5269ff8ff42123
-
SSDEEP
3072:obpDCw1p3vmLvsZIaVwiwDcIbDHDCm/DER4eQ9nQ1wJ:gDCwfG1bnxLERRa
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GBQHURCC = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GBQHURCC = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GBQHURCC = "W_X_C.bat" WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 4932 avscan.exe 4480 avscan.exe 5012 hosts.exe 1416 hosts.exe 912 avscan.exe 1848 hosts.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe File created \??\c:\windows\W_X_C.bat 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe File opened for modification C:\Windows\hosts.exe 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 2592 REG.exe 3964 REG.exe 444 REG.exe 2368 REG.exe 4120 REG.exe 4104 REG.exe 4236 REG.exe 3252 REG.exe 4332 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4932 avscan.exe 5012 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 4932 avscan.exe 4480 avscan.exe 5012 hosts.exe 1416 hosts.exe 912 avscan.exe 1848 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2592 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 79 PID 4868 wrote to memory of 2592 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 79 PID 4868 wrote to memory of 2592 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 79 PID 4868 wrote to memory of 4932 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 81 PID 4868 wrote to memory of 4932 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 81 PID 4868 wrote to memory of 4932 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 81 PID 4932 wrote to memory of 4480 4932 avscan.exe 82 PID 4932 wrote to memory of 4480 4932 avscan.exe 82 PID 4932 wrote to memory of 4480 4932 avscan.exe 82 PID 4932 wrote to memory of 696 4932 avscan.exe 83 PID 4932 wrote to memory of 696 4932 avscan.exe 83 PID 4932 wrote to memory of 696 4932 avscan.exe 83 PID 4868 wrote to memory of 4224 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 84 PID 4868 wrote to memory of 4224 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 84 PID 4868 wrote to memory of 4224 4868 6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe 84 PID 696 wrote to memory of 5012 696 cmd.exe 87 PID 696 wrote to memory of 5012 696 cmd.exe 87 PID 696 wrote to memory of 5012 696 cmd.exe 87 PID 4224 wrote to memory of 1416 4224 cmd.exe 88 PID 4224 wrote to memory of 1416 4224 cmd.exe 88 PID 4224 wrote to memory of 1416 4224 cmd.exe 88 PID 5012 wrote to memory of 912 5012 hosts.exe 89 PID 5012 wrote to memory of 912 5012 hosts.exe 89 PID 5012 wrote to memory of 912 5012 hosts.exe 89 PID 5012 wrote to memory of 4668 5012 hosts.exe 90 PID 5012 wrote to memory of 4668 5012 hosts.exe 90 PID 5012 wrote to memory of 4668 5012 hosts.exe 90 PID 4668 wrote to memory of 1848 4668 cmd.exe 93 PID 4668 wrote to memory of 1848 4668 cmd.exe 93 PID 4668 wrote to memory of 1848 4668 cmd.exe 93 PID 696 wrote to memory of 3332 696 cmd.exe 95 PID 696 wrote to memory of 3332 696 cmd.exe 95 PID 696 wrote to memory of 3332 696 cmd.exe 95 PID 4224 wrote to memory of 4448 4224 cmd.exe 94 PID 4224 wrote to memory of 4448 4224 cmd.exe 94 PID 4224 wrote to memory of 4448 4224 cmd.exe 94 PID 4668 wrote to memory of 1436 4668 cmd.exe 96 PID 4668 wrote to memory of 1436 4668 cmd.exe 96 PID 4668 wrote to memory of 1436 4668 cmd.exe 96 PID 4932 wrote to memory of 4120 4932 avscan.exe 99 PID 4932 wrote to memory of 4120 4932 avscan.exe 99 PID 4932 wrote to memory of 4120 4932 avscan.exe 99 PID 5012 wrote to memory of 4104 5012 hosts.exe 101 PID 5012 wrote to memory of 4104 5012 hosts.exe 101 PID 5012 wrote to memory of 4104 5012 hosts.exe 101 PID 5012 wrote to memory of 4236 5012 hosts.exe 105 PID 5012 wrote to memory of 4236 5012 hosts.exe 105 PID 5012 wrote to memory of 4236 5012 hosts.exe 105 PID 4932 wrote to memory of 3964 4932 avscan.exe 103 PID 4932 wrote to memory of 3964 4932 avscan.exe 103 PID 4932 wrote to memory of 3964 4932 avscan.exe 103 PID 4932 wrote to memory of 3252 4932 avscan.exe 107 PID 4932 wrote to memory of 3252 4932 avscan.exe 107 PID 4932 wrote to memory of 3252 4932 avscan.exe 107 PID 5012 wrote to memory of 444 5012 hosts.exe 109 PID 5012 wrote to memory of 444 5012 hosts.exe 109 PID 5012 wrote to memory of 444 5012 hosts.exe 109 PID 4932 wrote to memory of 4332 4932 avscan.exe 117 PID 5012 wrote to memory of 2368 5012 hosts.exe 118 PID 4932 wrote to memory of 4332 4932 avscan.exe 117 PID 4932 wrote to memory of 4332 4932 avscan.exe 117 PID 5012 wrote to memory of 2368 5012 hosts.exe 118 PID 5012 wrote to memory of 2368 5012 hosts.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe"C:\Users\Admin\AppData\Local\Temp\6d6aed52295247e307937da943064d8573c5f974272548b35aa7979497880f89.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:696 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1848
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
PID:1436
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:4104
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:4236
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:444
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:2368
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:3332
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4120
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:3964
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:3252
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:4448
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2024
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD599178545d3ff429ff65dfa804297342b
SHA1657418ccbb9bde36672f68101481fc020f18090c
SHA2568eff317830b941df6bef9d74a815581e6d096f4589ea0967a88498843fe1271d
SHA512d8ac96a0c215c43c3e1517f497d6383381c4ea0007ae63e116bcf176841eeabb77fa195604ae4370fefa1419b99267ccb8c716148b8015e3741cb513c107fe02
-
Filesize
188KB
MD599178545d3ff429ff65dfa804297342b
SHA1657418ccbb9bde36672f68101481fc020f18090c
SHA2568eff317830b941df6bef9d74a815581e6d096f4589ea0967a88498843fe1271d
SHA512d8ac96a0c215c43c3e1517f497d6383381c4ea0007ae63e116bcf176841eeabb77fa195604ae4370fefa1419b99267ccb8c716148b8015e3741cb513c107fe02
-
Filesize
188KB
MD599178545d3ff429ff65dfa804297342b
SHA1657418ccbb9bde36672f68101481fc020f18090c
SHA2568eff317830b941df6bef9d74a815581e6d096f4589ea0967a88498843fe1271d
SHA512d8ac96a0c215c43c3e1517f497d6383381c4ea0007ae63e116bcf176841eeabb77fa195604ae4370fefa1419b99267ccb8c716148b8015e3741cb513c107fe02
-
Filesize
188KB
MD599178545d3ff429ff65dfa804297342b
SHA1657418ccbb9bde36672f68101481fc020f18090c
SHA2568eff317830b941df6bef9d74a815581e6d096f4589ea0967a88498843fe1271d
SHA512d8ac96a0c215c43c3e1517f497d6383381c4ea0007ae63e116bcf176841eeabb77fa195604ae4370fefa1419b99267ccb8c716148b8015e3741cb513c107fe02
-
Filesize
195B
MD55b87381bf407d7c6018a8b11c3e20f92
SHA1bb61b28d9c8fd7dfeb13a397c49a1be3abc06ca2
SHA2564785d6a229d0872fe90c75ab620de9a680d7f07ccd27a134da2afc4ee88f34f3
SHA51205db1178f671e9d6c3a1c601349093447b04ebddcd071a06f7cc92cbaf7efb53027bc92523a19372a08ca5af715cc9955649255f8be1909b5e594385b3dcbe3d
-
Filesize
188KB
MD59c7140830c22e7e22f2bf3c983203593
SHA1b0135c2bafeae7faace7b08a9ca3f7a83adc6c63
SHA256b12dfe99db7779ff0971e16b9c53d8a826d22e4a334e87392276bc5701b190c7
SHA5124c6d349ac80d3f07086398b73ac267cd9349fb19710a7b08c021f8050790e0f0289f4859bd0db462697e3650fa6ea567974c7b169955bbb4691ecf803e167d8c
-
Filesize
188KB
MD59c7140830c22e7e22f2bf3c983203593
SHA1b0135c2bafeae7faace7b08a9ca3f7a83adc6c63
SHA256b12dfe99db7779ff0971e16b9c53d8a826d22e4a334e87392276bc5701b190c7
SHA5124c6d349ac80d3f07086398b73ac267cd9349fb19710a7b08c021f8050790e0f0289f4859bd0db462697e3650fa6ea567974c7b169955bbb4691ecf803e167d8c
-
Filesize
188KB
MD59c7140830c22e7e22f2bf3c983203593
SHA1b0135c2bafeae7faace7b08a9ca3f7a83adc6c63
SHA256b12dfe99db7779ff0971e16b9c53d8a826d22e4a334e87392276bc5701b190c7
SHA5124c6d349ac80d3f07086398b73ac267cd9349fb19710a7b08c021f8050790e0f0289f4859bd0db462697e3650fa6ea567974c7b169955bbb4691ecf803e167d8c
-
Filesize
188KB
MD59c7140830c22e7e22f2bf3c983203593
SHA1b0135c2bafeae7faace7b08a9ca3f7a83adc6c63
SHA256b12dfe99db7779ff0971e16b9c53d8a826d22e4a334e87392276bc5701b190c7
SHA5124c6d349ac80d3f07086398b73ac267cd9349fb19710a7b08c021f8050790e0f0289f4859bd0db462697e3650fa6ea567974c7b169955bbb4691ecf803e167d8c
-
Filesize
188KB
MD59c7140830c22e7e22f2bf3c983203593
SHA1b0135c2bafeae7faace7b08a9ca3f7a83adc6c63
SHA256b12dfe99db7779ff0971e16b9c53d8a826d22e4a334e87392276bc5701b190c7
SHA5124c6d349ac80d3f07086398b73ac267cd9349fb19710a7b08c021f8050790e0f0289f4859bd0db462697e3650fa6ea567974c7b169955bbb4691ecf803e167d8c
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b