Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
Resource
win10v2004-20220812-en
General
-
Target
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe
-
Size
136KB
-
MD5
3430ff52775bed3ea223b54664f870a1
-
SHA1
0f123f8438fe702576e07d2dbc7c0d4de571cc22
-
SHA256
42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702
-
SHA512
aa750b3b6dc72ccb71fd14ceec0d5b2d52750abf694acb00dede925371b3b0000676cd23eafd65fed7cfed516b94e29f1fcc1fa0e86fc28c6713ff2be2444d71
-
SSDEEP
3072:yqsMMtnsXGsLd0gePcPuiPfDZS+biFO8bkwLI0zKdmGa44nK:yjn8XuPcPnfEXkZ0zKd934n
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" clroil.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 clroil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /x" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /F" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /V" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /E" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /s" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /y" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /I" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /A" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /M" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /e" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /i" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /U" clroil.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /L" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /q" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /b" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /Q" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /d" 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /G" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /W" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /Z" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /C" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /k" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /a" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /u" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /c" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /K" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /g" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /P" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /j" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /O" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /o" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /S" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /p" clroil.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /T" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /r" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /t" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /m" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /d" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /D" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /R" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /B" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /N" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /H" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /l" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /J" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /X" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /f" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /z" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /n" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /Y" clroil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clroil = "C:\\Users\\Admin\\clroil.exe /v" clroil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4760 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 4760 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe 4192 clroil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4760 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 4192 clroil.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4192 4760 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 79 PID 4760 wrote to memory of 4192 4760 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 79 PID 4760 wrote to memory of 4192 4760 42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe"C:\Users\Admin\AppData\Local\Temp\42079fc4b659e7ed219cf000b2d3f63073c8eec577436c8437b246567eb96702.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\clroil.exe"C:\Users\Admin\clroil.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5962ab222b3a14f18b87ad4ff673f754f
SHA1c4ef465db40080a9254a338114b86bc9a9fceda5
SHA256b4e04f2c0b1f7f5ac1fabfe5d5214898cdcd8a5a1b38b5b5b79c075f4b690f1a
SHA51289dbc2c4cdc5689d1565adacc12890e691e8402760b47d0715b636246de81d70e1f50bcb148c625c611411b63c28d68fcc98f077fc7212915ce5f0fb3e4ca9c4
-
Filesize
136KB
MD5962ab222b3a14f18b87ad4ff673f754f
SHA1c4ef465db40080a9254a338114b86bc9a9fceda5
SHA256b4e04f2c0b1f7f5ac1fabfe5d5214898cdcd8a5a1b38b5b5b79c075f4b690f1a
SHA51289dbc2c4cdc5689d1565adacc12890e691e8402760b47d0715b636246de81d70e1f50bcb148c625c611411b63c28d68fcc98f077fc7212915ce5f0fb3e4ca9c4