Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe
Resource
win10v2004-20221111-en
General
-
Target
b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe
-
Size
224KB
-
MD5
4aa846deaf75d5d64374d92ecce216df
-
SHA1
85bc22191d0d1a1baefd27ec3d05333069894554
-
SHA256
b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90
-
SHA512
f3b186ce69fe2380a2ad50854d804868c00981608a8dc4e72585b1a791c7393d7a61d5c79ffa5d0748d9658c3a5a828623a2525e2c61060d2579614bf2089b4d
-
SSDEEP
3072:hiY5bQ7aWbqDImDrT+UvtkvnNBLieMyiayNe2XKrJlZm6lDH:hF+uImDrT+U1QtMyiaO6NR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" seuyag.exe -
Executes dropped EXE 1 IoCs
pid Process 1484 seuyag.exe -
Loads dropped DLL 2 IoCs
pid Process 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe -
Adds Run key to start application 2 TTPs 44 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /T" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /s" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /U" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /Y" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /x" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /b" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /d" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /i" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /h" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /E" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /a" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /t" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /D" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /v" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /w" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /u" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /R" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /k" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /H" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /S" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /V" b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /q" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /B" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /r" seuyag.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /A" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /N" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /o" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /e" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /z" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /p" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /J" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /n" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /l" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /m" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /X" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /y" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /Z" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /Q" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /W" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /C" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /O" seuyag.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\seuyag = "C:\\Users\\Admin\\seuyag.exe /j" seuyag.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe 1484 seuyag.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 1484 seuyag.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1484 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 28 PID 1076 wrote to memory of 1484 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 28 PID 1076 wrote to memory of 1484 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 28 PID 1076 wrote to memory of 1484 1076 b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe"C:\Users\Admin\AppData\Local\Temp\b1e3834e0ce649b0f7fb4867bc3005cb45a915c7ff25fe29d5bad6a47fedcb90.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\seuyag.exe"C:\Users\Admin\seuyag.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b13a621bf500eafc1811138c9e43f736
SHA17956e6ca6b0f17c22defdd2f71b35f3852cfa52f
SHA2561a168b9b4e98d713a80d77e1a489253a9585990eb4e1bd5c5c487f7c61179df6
SHA512f43e2d0a0ab534fb625b592346d49471c16aab325e73c43bf331966fab7aafd2ac4f5a916e5363216364f7048ca92452852ea9b6609345fae37f4ae9fabe7ba6
-
Filesize
224KB
MD5b13a621bf500eafc1811138c9e43f736
SHA17956e6ca6b0f17c22defdd2f71b35f3852cfa52f
SHA2561a168b9b4e98d713a80d77e1a489253a9585990eb4e1bd5c5c487f7c61179df6
SHA512f43e2d0a0ab534fb625b592346d49471c16aab325e73c43bf331966fab7aafd2ac4f5a916e5363216364f7048ca92452852ea9b6609345fae37f4ae9fabe7ba6
-
Filesize
224KB
MD5b13a621bf500eafc1811138c9e43f736
SHA17956e6ca6b0f17c22defdd2f71b35f3852cfa52f
SHA2561a168b9b4e98d713a80d77e1a489253a9585990eb4e1bd5c5c487f7c61179df6
SHA512f43e2d0a0ab534fb625b592346d49471c16aab325e73c43bf331966fab7aafd2ac4f5a916e5363216364f7048ca92452852ea9b6609345fae37f4ae9fabe7ba6
-
Filesize
224KB
MD5b13a621bf500eafc1811138c9e43f736
SHA17956e6ca6b0f17c22defdd2f71b35f3852cfa52f
SHA2561a168b9b4e98d713a80d77e1a489253a9585990eb4e1bd5c5c487f7c61179df6
SHA512f43e2d0a0ab534fb625b592346d49471c16aab325e73c43bf331966fab7aafd2ac4f5a916e5363216364f7048ca92452852ea9b6609345fae37f4ae9fabe7ba6