Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe
Resource
win10v2004-20221111-en
General
-
Target
b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe
-
Size
288KB
-
MD5
8f1d838ba4d6c7a51a962d9abfa30c60
-
SHA1
b942265c3c571b1dd811d2853befa5720065468f
-
SHA256
b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd
-
SHA512
1df5440194c5129938cf5640a9c5b2a54de3535721777ad8151e72569344f4ec23d603b3be3b3ab2e080cebf22b22e0edae5dbc8264b45e16912bf20970b8e2f
-
SSDEEP
3072:AU0nUhhQdiEXIOZAksTCPkix7Fe7dEN8EXgNqf5cTrWi6ei2uiTbtTmH8Fe90p0X:70JiDbYJFsE0NMCP6wJYj8t/cx
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fmzob.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe -
Executes dropped EXE 1 IoCs
pid Process 988 fmzob.exe -
Loads dropped DLL 2 IoCs
pid Process 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /p" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /n" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /r" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /T" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /C" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /Y" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /s" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /J" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /E" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /d" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /k" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /R" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /N" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /F" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /m" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /L" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /b" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /v" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /H" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /g" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /l" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /x" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /i" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /c" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /I" b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /y" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /u" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /w" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /I" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /f" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /G" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /S" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /M" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /X" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /V" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /K" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /B" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /q" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /W" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /Q" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /o" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /P" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /t" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /A" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /a" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /h" fmzob.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /U" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /e" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /j" fmzob.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\fmzob = "C:\\Users\\Admin\\fmzob.exe /O" fmzob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe 988 fmzob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 988 fmzob.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 988 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 27 PID 748 wrote to memory of 988 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 27 PID 748 wrote to memory of 988 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 27 PID 748 wrote to memory of 988 748 b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe"C:\Users\Admin\AppData\Local\Temp\b8308216847e9ceb2e760e2a216602ca789bacf56084de45f8e52d5e0e4868bd.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\fmzob.exe"C:\Users\Admin\fmzob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5e6ca04a30519a5890fd88d9d57263cd4
SHA1bb0908091964e216ea450efa17a846436bfa1e60
SHA256cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667
SHA51209871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728
-
Filesize
288KB
MD5e6ca04a30519a5890fd88d9d57263cd4
SHA1bb0908091964e216ea450efa17a846436bfa1e60
SHA256cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667
SHA51209871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728
-
Filesize
288KB
MD5e6ca04a30519a5890fd88d9d57263cd4
SHA1bb0908091964e216ea450efa17a846436bfa1e60
SHA256cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667
SHA51209871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728
-
Filesize
288KB
MD5e6ca04a30519a5890fd88d9d57263cd4
SHA1bb0908091964e216ea450efa17a846436bfa1e60
SHA256cd13bf23490f846a5699f516f4b9e1e12e6f00b85b523fa3b0778a13a4671667
SHA51209871dc446eb2f0eaa59f1d75f1e39a0001ccb38835cf76a3adf5bd05a05d0be40be600bb0ed5d128ae6ecde172277b64a9c25db21d4b2b80b470c0200113728