Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe
Resource
win10v2004-20221111-en
General
-
Target
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe
-
Size
144KB
-
MD5
e51c9656caaa74ae856dd67c5e4bbaf0
-
SHA1
8aac8ca17dbc5864f14422771f6781ca6bcc2444
-
SHA256
4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
-
SHA512
7002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
SSDEEP
3072:T4Dq0BO5VIdhvoiOhkidHTBzSP052WKKM4XR14dv:69vhOhjdzBGPeHKIrY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xoimaaj.exe -
Executes dropped EXE 2 IoCs
pid Process 976 xoimaaj.exe 4760 xoimaaj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe -
Adds Run key to start application 2 TTPs 21 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /f" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /s" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /c" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /z" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /b" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /u" xoimaaj.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /r" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /j" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /v" xoimaaj.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /l" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /o" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /h" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /w" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /i" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /m" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /t" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /v" 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /p" xoimaaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xoimaaj = "C:\\Users\\Admin\\xoimaaj.exe /n" xoimaaj.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum xoimaaj.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 xoimaaj.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\c\autorun.inf xoimaaj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4564 set thread context of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 976 set thread context of 4760 976 xoimaaj.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 744 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 744 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe 4760 xoimaaj.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 744 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 976 xoimaaj.exe 4760 xoimaaj.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 4564 wrote to memory of 744 4564 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 84 PID 744 wrote to memory of 976 744 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 87 PID 744 wrote to memory of 976 744 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 87 PID 744 wrote to memory of 976 744 4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe 87 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88 PID 976 wrote to memory of 4760 976 xoimaaj.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe"C:\Users\Admin\AppData\Local\Temp\4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\4cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\xoimaaj.exe"C:\Users\Admin\xoimaaj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\xoimaaj.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4760
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643
-
Filesize
144KB
MD5e51c9656caaa74ae856dd67c5e4bbaf0
SHA18aac8ca17dbc5864f14422771f6781ca6bcc2444
SHA2564cc8eafc48b7a4f3752e1181159ffbb25eeac29105611c0cad31ce845e47ac9b
SHA5127002f55065bba31088caac4f14dc0af065674c29e8fcbe48b05b97e55af3f62723b58c47620471f4c3d484efcce4eadc453b2d126e75b0852ddfc8c98c5d7643