Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe
Resource
win10v2004-20220812-en
General
-
Target
436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe
-
Size
284KB
-
MD5
aa44e88f5d3d20b533d592de97c6ee36
-
SHA1
4c6fd6d3e59b280c7c021b0347c175d21fb272be
-
SHA256
436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5
-
SHA512
c201ae0d2878514de160ada7a6cf1cd45d65bf3b6eb9724ea33cf67e61d6f7ad943a5163cb2747bc08ce4d9d3ffe0cd189d6a55578ca17536cdfcb6f4d4f5b11
-
SSDEEP
3072:7nyyn+YSmpR1TmoNkMl4ymdu+sSi5KKGTKozEDGaKUa6xUgyX6lgq1Kx5RK1fYxe:9+BmVmoNkMl4ymdu+sSi5KKGsjO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mearoz.exe -
Executes dropped EXE 1 IoCs
pid Process 1124 mearoz.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /v" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /j" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /K" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /m" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /Y" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /l" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /M" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /t" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /e" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /g" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /N" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /C" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /U" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /p" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /y" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /X" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /f" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /u" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /q" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /b" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /T" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /r" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /D" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /x" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /Z" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /A" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /h" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /L" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /o" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /k" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /Q" mearoz.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /s" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /a" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /R" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /S" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /n" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /B" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /W" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /c" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /H" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /d" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /P" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /G" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /J" mearoz.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mearoz = "C:\\Users\\Admin\\mearoz.exe /i" mearoz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe 1124 mearoz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe 1124 mearoz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1124 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe 28 PID 2036 wrote to memory of 1124 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe 28 PID 2036 wrote to memory of 1124 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe 28 PID 2036 wrote to memory of 1124 2036 436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe 28 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27 PID 1124 wrote to memory of 2036 1124 mearoz.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe"C:\Users\Admin\AppData\Local\Temp\436c306f623470d69d8c7922303a7b2bac134815121ab908b472399b02da2fc5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\mearoz.exe"C:\Users\Admin\mearoz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5af46d14cf13ea8b8f3a94d51335f0c58
SHA145b5fb6cf93a19cc4dbc31a7a3ceb07e6d037e1e
SHA256d319e24d108e7852de4c8f891bb27062a3644bf9b2bbc72c22300af7133a55b9
SHA512625000bbd41541e28de45905497cc12371d01360438520af92d7d0f6f6f04dd8b644930a6ac4d5a5f48e9df2b7ef4e4ea1fef8ec3dd5d30ef9415df98ec91e8e
-
Filesize
284KB
MD5af46d14cf13ea8b8f3a94d51335f0c58
SHA145b5fb6cf93a19cc4dbc31a7a3ceb07e6d037e1e
SHA256d319e24d108e7852de4c8f891bb27062a3644bf9b2bbc72c22300af7133a55b9
SHA512625000bbd41541e28de45905497cc12371d01360438520af92d7d0f6f6f04dd8b644930a6ac4d5a5f48e9df2b7ef4e4ea1fef8ec3dd5d30ef9415df98ec91e8e
-
Filesize
284KB
MD5af46d14cf13ea8b8f3a94d51335f0c58
SHA145b5fb6cf93a19cc4dbc31a7a3ceb07e6d037e1e
SHA256d319e24d108e7852de4c8f891bb27062a3644bf9b2bbc72c22300af7133a55b9
SHA512625000bbd41541e28de45905497cc12371d01360438520af92d7d0f6f6f04dd8b644930a6ac4d5a5f48e9df2b7ef4e4ea1fef8ec3dd5d30ef9415df98ec91e8e
-
Filesize
284KB
MD5af46d14cf13ea8b8f3a94d51335f0c58
SHA145b5fb6cf93a19cc4dbc31a7a3ceb07e6d037e1e
SHA256d319e24d108e7852de4c8f891bb27062a3644bf9b2bbc72c22300af7133a55b9
SHA512625000bbd41541e28de45905497cc12371d01360438520af92d7d0f6f6f04dd8b644930a6ac4d5a5f48e9df2b7ef4e4ea1fef8ec3dd5d30ef9415df98ec91e8e