Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe
Resource
win10v2004-20220812-en
General
-
Target
b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe
-
Size
135KB
-
MD5
724e7888c2f6aa2dfe660f7f8ec3e463
-
SHA1
3793028ed9371ceeb69e60780af864cf3653b8a6
-
SHA256
b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308
-
SHA512
3b32ec899aba3be82a27c5a6424b78ac89f96bd80c866cb1ede9b4d1b75b1a65c494338d6f8c8361fab76bed6dbfeb3cc8b84da1d7d49fbd91cd699e180f2c8b
-
SSDEEP
3072:Wy5GeG8UPb1WpXVxAaGBvbNvNbNJkvmhyPQbaDTUXGIDbwKDqCtrwdAxaVTtVHLO:Dke4oIDbByGPMsMP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" chxul.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 chxul.exe -
Loads dropped DLL 2 IoCs
pid Process 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ chxul.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\chxul = "C:\\Users\\Admin\\chxul.exe" chxul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe 1912 chxul.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe 1912 chxul.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1912 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe 28 PID 1188 wrote to memory of 1912 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe 28 PID 1188 wrote to memory of 1912 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe 28 PID 1188 wrote to memory of 1912 1188 b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe 28 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27 PID 1912 wrote to memory of 1188 1912 chxul.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe"C:\Users\Admin\AppData\Local\Temp\b62e8719f6ba79467de5b0b3e7f042ff1a18287cf569848ef61dbcc7ce321308.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\chxul.exe"C:\Users\Admin\chxul.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5721504681559b9b4acf72ea64253ecda
SHA126e5525faa7d5e493f950d5d85c5cf4fd0984a73
SHA256585b22d66b7ad57082ce6aaca032d141dbbaca4a4438037b829da00e53132846
SHA5123df19fa987449fdf0bfd607b56990c594de3201c4c518e9a6a1f349a677cc426960b333e051d9cd80f11982abe955a48a477261cfeb0a53470a5966217e37aec
-
Filesize
135KB
MD5721504681559b9b4acf72ea64253ecda
SHA126e5525faa7d5e493f950d5d85c5cf4fd0984a73
SHA256585b22d66b7ad57082ce6aaca032d141dbbaca4a4438037b829da00e53132846
SHA5123df19fa987449fdf0bfd607b56990c594de3201c4c518e9a6a1f349a677cc426960b333e051d9cd80f11982abe955a48a477261cfeb0a53470a5966217e37aec
-
Filesize
135KB
MD5721504681559b9b4acf72ea64253ecda
SHA126e5525faa7d5e493f950d5d85c5cf4fd0984a73
SHA256585b22d66b7ad57082ce6aaca032d141dbbaca4a4438037b829da00e53132846
SHA5123df19fa987449fdf0bfd607b56990c594de3201c4c518e9a6a1f349a677cc426960b333e051d9cd80f11982abe955a48a477261cfeb0a53470a5966217e37aec
-
Filesize
135KB
MD5721504681559b9b4acf72ea64253ecda
SHA126e5525faa7d5e493f950d5d85c5cf4fd0984a73
SHA256585b22d66b7ad57082ce6aaca032d141dbbaca4a4438037b829da00e53132846
SHA5123df19fa987449fdf0bfd607b56990c594de3201c4c518e9a6a1f349a677cc426960b333e051d9cd80f11982abe955a48a477261cfeb0a53470a5966217e37aec