Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe
Resource
win10v2004-20220812-en
General
-
Target
355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe
-
Size
172KB
-
MD5
50d48101cc4f0a4c8df9d67a82fa6736
-
SHA1
6ed7dd5d7f6f2b7a8314b8243e4b47cacefcef61
-
SHA256
355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e
-
SHA512
379fea762e2b1a5b14a95704d26984d8fc0337f61a4919faff64c3da38ac1876f22fef542942069ad4acbf6b3f839680bc6c183f0baea7cc91b0a5aaeac87d4e
-
SSDEEP
3072:RmFonoVD8oSx/mvXAFIFR7Nzim04f1fhLOG7GQiCLMt8Xt/Wv6mgem:RwoUD8oSx/mvXAFIFR7N7DfhhLOG7GQe
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" voekoj.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 voekoj.exe -
Loads dropped DLL 2 IoCs
pid Process 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /K" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /q" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /X" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /k" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /S" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /F" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /L" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /m" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /g" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /R" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /i" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /E" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /s" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /A" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /G" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /P" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /B" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /H" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /t" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /l" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /j" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /Y" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /M" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /d" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /r" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /x" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /W" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /v" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /V" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /h" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /D" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /p" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /Q" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /n" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /w" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /T" voekoj.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /a" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /o" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /I" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /e" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /y" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /c" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /O" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /z" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /f" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /C" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /N" voekoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\voekoj = "C:\\Users\\Admin\\voekoj.exe /u" voekoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe 1148 voekoj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe 1148 voekoj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1148 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe 28 PID 1380 wrote to memory of 1148 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe 28 PID 1380 wrote to memory of 1148 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe 28 PID 1380 wrote to memory of 1148 1380 355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe 28 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17 PID 1148 wrote to memory of 1380 1148 voekoj.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe"C:\Users\Admin\AppData\Local\Temp\355b2f477eb54a8efc4b2a5fe930650b7c2982190b298d1579f2b4b1daa80a0e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\voekoj.exe"C:\Users\Admin\voekoj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5da8551bc4f883deba2acb3098cc48ddd
SHA157ea14a117f6110e585745fa040aec964f5e2c7e
SHA256ef7fe1740f63e8ec1d0a69ad59f73c63c706cd39a3e4fe481f772c349bd35422
SHA512348390c4e4336d55876436cfd227e40ab8e352a491b3179b5f1a6feb65bae1198ba77a319c035c081664f8dfb55f1a2c63962ded4218addd82802fd8150adad6
-
Filesize
172KB
MD5da8551bc4f883deba2acb3098cc48ddd
SHA157ea14a117f6110e585745fa040aec964f5e2c7e
SHA256ef7fe1740f63e8ec1d0a69ad59f73c63c706cd39a3e4fe481f772c349bd35422
SHA512348390c4e4336d55876436cfd227e40ab8e352a491b3179b5f1a6feb65bae1198ba77a319c035c081664f8dfb55f1a2c63962ded4218addd82802fd8150adad6
-
Filesize
172KB
MD5da8551bc4f883deba2acb3098cc48ddd
SHA157ea14a117f6110e585745fa040aec964f5e2c7e
SHA256ef7fe1740f63e8ec1d0a69ad59f73c63c706cd39a3e4fe481f772c349bd35422
SHA512348390c4e4336d55876436cfd227e40ab8e352a491b3179b5f1a6feb65bae1198ba77a319c035c081664f8dfb55f1a2c63962ded4218addd82802fd8150adad6
-
Filesize
172KB
MD5da8551bc4f883deba2acb3098cc48ddd
SHA157ea14a117f6110e585745fa040aec964f5e2c7e
SHA256ef7fe1740f63e8ec1d0a69ad59f73c63c706cd39a3e4fe481f772c349bd35422
SHA512348390c4e4336d55876436cfd227e40ab8e352a491b3179b5f1a6feb65bae1198ba77a319c035c081664f8dfb55f1a2c63962ded4218addd82802fd8150adad6