Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe
Resource
win10v2004-20221111-en
General
-
Target
e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe
-
Size
92KB
-
MD5
32abe8c68833eedffd3e75a02ace0c8c
-
SHA1
34507363198f5b53be73713a08b17e3ff743b6b0
-
SHA256
e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9
-
SHA512
96785f7274442b3f6ce7b91d7bf9352ded7ef358ad733f0c348544ac2f4e86dfa87d2a14f0dbf83a4b4d9307188f27459bff78219021901714db144266336765
-
SSDEEP
768:cdcj7MZtBTSD9mx0CjIGhY4VVN2b1LllfRddcQVEWmSgPl53XXT+Aeu0:cdZq9Cr0GhXKdTdTiWmDPv3XAu0
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vesik.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe -
Executes dropped EXE 1 IoCs
pid Process 768 vesik.exe -
Loads dropped DLL 2 IoCs
pid Process 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /u" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /e" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /t" vesik.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /q" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /p" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /d" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /w" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /z" vesik.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /d" e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /v" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /m" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /r" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /o" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /h" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /n" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /b" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /y" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /c" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /k" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /i" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /x" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /l" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /f" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /j" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /g" vesik.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\vesik = "C:\\Users\\Admin\\vesik.exe /s" vesik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe 768 vesik.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 768 vesik.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 768 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 28 PID 1952 wrote to memory of 768 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 28 PID 1952 wrote to memory of 768 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 28 PID 1952 wrote to memory of 768 1952 e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe"C:\Users\Admin\AppData\Local\Temp\e762b07d679a28559eda694236b236c99db7da1f3bf73f09b2f2fbd89c6347d9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\vesik.exe"C:\Users\Admin\vesik.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55ae4cc460574748fb1bb816525f98ffa
SHA16f237cd72c8f4cd71f2d4e00fe4e7ce2b74594ae
SHA2562f9c96a3874a0f852481e804c4aaa0525c6c3122b080d86a9d2ded5cd0135f18
SHA512d9718821d72e1940b3fb05b1be8711f5601437236e7edd71bd98e93b7fdd5db67fccbd2d416604df81f6735e57d7a62c2d4b02d7f9aa92d014336c8e1788b213
-
Filesize
92KB
MD55ae4cc460574748fb1bb816525f98ffa
SHA16f237cd72c8f4cd71f2d4e00fe4e7ce2b74594ae
SHA2562f9c96a3874a0f852481e804c4aaa0525c6c3122b080d86a9d2ded5cd0135f18
SHA512d9718821d72e1940b3fb05b1be8711f5601437236e7edd71bd98e93b7fdd5db67fccbd2d416604df81f6735e57d7a62c2d4b02d7f9aa92d014336c8e1788b213
-
Filesize
92KB
MD55ae4cc460574748fb1bb816525f98ffa
SHA16f237cd72c8f4cd71f2d4e00fe4e7ce2b74594ae
SHA2562f9c96a3874a0f852481e804c4aaa0525c6c3122b080d86a9d2ded5cd0135f18
SHA512d9718821d72e1940b3fb05b1be8711f5601437236e7edd71bd98e93b7fdd5db67fccbd2d416604df81f6735e57d7a62c2d4b02d7f9aa92d014336c8e1788b213
-
Filesize
92KB
MD55ae4cc460574748fb1bb816525f98ffa
SHA16f237cd72c8f4cd71f2d4e00fe4e7ce2b74594ae
SHA2562f9c96a3874a0f852481e804c4aaa0525c6c3122b080d86a9d2ded5cd0135f18
SHA512d9718821d72e1940b3fb05b1be8711f5601437236e7edd71bd98e93b7fdd5db67fccbd2d416604df81f6735e57d7a62c2d4b02d7f9aa92d014336c8e1788b213