Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe
Resource
win10v2004-20221111-en
General
-
Target
f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe
-
Size
911KB
-
MD5
00ca2f10a413071f98f66b830aa9fe88
-
SHA1
1d86fe0eb3d328221eb1a822f2ee825e78f5c520
-
SHA256
f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f
-
SHA512
31cf5e4dabd966ead74a2e47d7307f0c88af25c58ec27118a67e73823d4f53abca9c98a74f7a708d30eb65352115990226d2c4a38a7f3d886e4cfa7780c6f2f4
-
SSDEEP
12288:+K2mhAMJ/cPlhTrT58h7UZ6+5d2J/R+OOWy2PSQQhcuchCpjAHIC:v2O/GlRrK7nJQ5WRPuCXCdTC
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/828-81-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/828-82-0x0000000000402196-mapping.dmp netwire behavioral1/memory/828-85-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/828-87-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
pid Process 1816 uraqjzqeoozs.exe 1308 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{M7B5O35D-PMU4-LL4B-5Y28-40Y6856IU651} RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{M7B5O35D-PMU4-LL4B-5Y28-40Y6856IU651}\StubPath = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\"" RegSvcs.exe -
Loads dropped DLL 6 IoCs
pid Process 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 904 WScript.exe 628 WScript.exe -
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RUN uraqjzqeoozs.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe" RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce uraqjzqeoozs.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\C:\Users\Admin\io46471 = "C:\\Users\\Admin\\io46471\\mcreusgyvpo.vbs" uraqjzqeoozs.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uraqjzqeoozs.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RUN uraqjzqeoozs.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce uraqjzqeoozs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uraqjzqeoozs.exe Key deleted \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RUN uraqjzqeoozs.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\C:\Users\Admin\io46471 = "C:\\Users\\Admin\\io46471\\mcreusgyvpo.vbs" uraqjzqeoozs.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uraqjzqeoozs.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RUN uraqjzqeoozs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uraqjzqeoozs.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ RegSvcs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uraqjzqeoozs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uraqjzqeoozs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1804 set thread context of 828 1804 uraqjzqeoozs.exe 34 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\.Identifier RegSvcs.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\.Identifier RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1816 uraqjzqeoozs.exe 1308 uraqjzqeoozs.exe 1308 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe 1804 uraqjzqeoozs.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1340 wrote to memory of 1816 1340 f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe 28 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 1664 1816 uraqjzqeoozs.exe 29 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 628 1816 uraqjzqeoozs.exe 30 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 1816 wrote to memory of 904 1816 uraqjzqeoozs.exe 31 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 904 wrote to memory of 1308 904 WScript.exe 32 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 628 wrote to memory of 1804 628 WScript.exe 33 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34 PID 1804 wrote to memory of 828 1804 uraqjzqeoozs.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe"C:\Users\Admin\AppData\Local\Temp\f9e2c79659921f4f0fa54e6d6d960f8e83c61577c2d0601ab2d56c65879b323f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\io46471\uraqjzqeoozs.exe"C:\Users\Admin\io46471\uraqjzqeoozs.exe" gckvtfrzd2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1664
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\io46471\run.vbs"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\io46471\uraqjzqeoozs.exe"C:\Users\Admin\io46471\uraqjzqeoozs.exe" gckvtfrzd4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
PID:828
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\io46471\run.vbs"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\io46471\uraqjzqeoozs.exe"C:\Users\Admin\io46471\uraqjzqeoozs.exe" gckvtfrzd4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD52b2e8e42231da09e80a757bf6233c6f5
SHA11e9ac3354d92bf45bbb365973c1411feddff8a7a
SHA2564e443193eeecc09a571e864396e99a49e13061755e044047c3514b6beca3b192
SHA51271bb82d7b4353d89c3cb967f0bef0d4223336130a30f5b93a5ed03f996e499c184b673590651e7fd25da5e7c6b11b2628808e4be7772bd87a159e5c3e20dc5de
-
Filesize
646.7MB
MD5a0d422ffd069f8f30cc7a36a2bcb6275
SHA1983d6b8d84efec9a8d54788ab8c4fddbf2b12bf1
SHA2566b77f0632f56a0569a5ae170becd4de326a7e47edcaa94e42337741ecc6c0241
SHA5120ded2597d30e699b7ecbaab5d6b0b1fbb82ae110cb930af5061d8f491eff76680761a648a1913908a328ebed2db5398a760cc6854dd08061890c4a4693349814
-
Filesize
140B
MD5c1b0ee38b17338787c12e654561d5d64
SHA1e9bcdc45d03e3036ddd6a01e4165a5b25a2c38af
SHA256f0b8f8277839261a2f9c5eaa9a535c1d151adb6694d3dcdfb901656867f1f1ee
SHA5127f3874a7cf36a9a0b0367353ae8f96028ce9a5c6799b525d157485497234484044c573a89d77003f9fce523937ff89feebb3a203eb49abd998fdf4e3a6996a13
-
Filesize
94B
MD573eb3aab7c9bdb6a79dc2d3e60a8a64e
SHA19ef5b1db579c64e02006d062b17fad95034ca5d2
SHA256a045998dcc14b187b50832653fb4da90da20f3a55ae1ce0b5ba492bd4c7645b6
SHA512e80466a6724b2502ffa1e5d26bb83dac7b9985af0957a27108a5e021873d67d9ff9550411a3c273a547a38a8b4f13709beb95f129717eb87fc13fe585ff2fdb3
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59