Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
Resource
win10v2004-20220812-en
General
-
Target
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
-
Size
136KB
-
MD5
3430ff52775bed3ea223b54664f870a1
-
SHA1
0f123f8438fe702576e07d2dbc7c0d4de571cc22
-
SHA256
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702
-
SHA512
aa750b3b6dc72ccb71fd14ceec0d5b2d52750abf694acb00dede925371b3b0000676cd23eafd65fed7cfed516b94e29f1fcc1fa0e86fc28c6713ff2be2444d71
-
SSDEEP
3072:yqsMMtnsXGsLd0gePcPuiPfDZS+biFO8bkwLI0zKdmGa44nK:yjn8XuPcPnfEXkZ0zKd934n
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hmyaac.exe -
Executes dropped EXE 1 IoCs
pid Process 524 hmyaac.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe -
Adds Run key to start application 2 TTPs 48 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /s" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /L" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /y" hmyaac.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /W" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /X" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /S" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /H" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /j" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /Q" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /t" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /c" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /b" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /h" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /B" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /u" 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /N" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /e" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /Y" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /E" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /p" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /k" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /Z" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /C" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /T" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /x" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /n" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /A" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /m" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /w" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /f" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /d" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /G" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /q" hmyaac.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /I" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /o" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /u" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /K" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /U" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /J" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /P" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /O" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /g" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /R" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /M" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /F" hmyaac.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\hmyaac = "C:\\Users\\Admin\\hmyaac.exe /V" hmyaac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe 524 hmyaac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 524 hmyaac.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 524 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 27 PID 1736 wrote to memory of 524 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 27 PID 1736 wrote to memory of 524 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 27 PID 1736 wrote to memory of 524 1736 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe"C:\Users\Admin\AppData\Local\Temp\42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\hmyaac.exe"C:\Users\Admin\hmyaac.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:524
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5b494a911437c228f771e732ad20801e1
SHA19f687d88a6e93a834254edaca5df48f938494563
SHA2565da8b383f7da133c5c08f1de81b126ab646151ef92d119a38c4ea2466b2f359f
SHA5124a3cc4641054f75f5427bf4ea45239fe92c9473834d5f62083ab4427da4fe34e3cec6b5ecc364f9ea4f564954a2d83a16788761debe2f05ce7681b71629eda62
-
Filesize
136KB
MD5b494a911437c228f771e732ad20801e1
SHA19f687d88a6e93a834254edaca5df48f938494563
SHA2565da8b383f7da133c5c08f1de81b126ab646151ef92d119a38c4ea2466b2f359f
SHA5124a3cc4641054f75f5427bf4ea45239fe92c9473834d5f62083ab4427da4fe34e3cec6b5ecc364f9ea4f564954a2d83a16788761debe2f05ce7681b71629eda62
-
Filesize
136KB
MD5b494a911437c228f771e732ad20801e1
SHA19f687d88a6e93a834254edaca5df48f938494563
SHA2565da8b383f7da133c5c08f1de81b126ab646151ef92d119a38c4ea2466b2f359f
SHA5124a3cc4641054f75f5427bf4ea45239fe92c9473834d5f62083ab4427da4fe34e3cec6b5ecc364f9ea4f564954a2d83a16788761debe2f05ce7681b71629eda62
-
Filesize
136KB
MD5b494a911437c228f771e732ad20801e1
SHA19f687d88a6e93a834254edaca5df48f938494563
SHA2565da8b383f7da133c5c08f1de81b126ab646151ef92d119a38c4ea2466b2f359f
SHA5124a3cc4641054f75f5427bf4ea45239fe92c9473834d5f62083ab4427da4fe34e3cec6b5ecc364f9ea4f564954a2d83a16788761debe2f05ce7681b71629eda62