Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe
Resource
win10v2004-20220901-en
General
-
Target
0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe
-
Size
148KB
-
MD5
1193a33ec8da0ed1c0dee19519079ed0
-
SHA1
629fd623804dbe64f20298e91c2c2eea45ab3634
-
SHA256
0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1
-
SHA512
b04e2b7c02d84dd7b3de80e34fce6c63623858af36c4fc783d984370c8433d5b5026ca381321ce912d8e784ba1749757a8b985e5965fdfe90770cc4e0e88f9e0
-
SSDEEP
1536:FzIxU6wWnlhXcro1XxcazFABdFkouQ1KeCrhzra78rBkqhpMK/vIqXIVFSQaq9i9:jSlRcro1XaPBQo1MHksqqXIVFSQre1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rieduun.exe -
Executes dropped EXE 1 IoCs
pid Process 948 rieduun.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /b" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /m" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /g" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /r" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /n" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /d" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /z" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /y" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /e" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /k" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /i" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /h" rieduun.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /p" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /l" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /c" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /u" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /w" rieduun.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /j" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /t" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /q" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /x" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /f" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /t" 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /s" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /a" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /o" rieduun.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\rieduun = "C:\\Users\\Admin\\rieduun.exe /v" rieduun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe 948 rieduun.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 948 rieduun.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 948 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 27 PID 1228 wrote to memory of 948 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 27 PID 1228 wrote to memory of 948 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 27 PID 1228 wrote to memory of 948 1228 0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe"C:\Users\Admin\AppData\Local\Temp\0d5060798b3f66722b66f0e1ad91c80c01086c1e7150e4534d7d26614420bfc1.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\rieduun.exe"C:\Users\Admin\rieduun.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD59707df9f8ab299099fcf671f12f5d278
SHA1b40fe16af3c1b4c986d0ec6a6984f27a142e9c7f
SHA25604044c4c46d8ae51784b2b2af68e4ed8b3b3ae3eb804b5c14586806fa6b995aa
SHA512411fd37577b93a9cb3e93f097ab89b93e6c443dd58bfbe8467c34b29e3b11987b275d8f19a955f7ea955471527ff1ae661af7c308111563cbc3a9024a6c771d4
-
Filesize
148KB
MD59707df9f8ab299099fcf671f12f5d278
SHA1b40fe16af3c1b4c986d0ec6a6984f27a142e9c7f
SHA25604044c4c46d8ae51784b2b2af68e4ed8b3b3ae3eb804b5c14586806fa6b995aa
SHA512411fd37577b93a9cb3e93f097ab89b93e6c443dd58bfbe8467c34b29e3b11987b275d8f19a955f7ea955471527ff1ae661af7c308111563cbc3a9024a6c771d4
-
Filesize
148KB
MD59707df9f8ab299099fcf671f12f5d278
SHA1b40fe16af3c1b4c986d0ec6a6984f27a142e9c7f
SHA25604044c4c46d8ae51784b2b2af68e4ed8b3b3ae3eb804b5c14586806fa6b995aa
SHA512411fd37577b93a9cb3e93f097ab89b93e6c443dd58bfbe8467c34b29e3b11987b275d8f19a955f7ea955471527ff1ae661af7c308111563cbc3a9024a6c771d4
-
Filesize
148KB
MD59707df9f8ab299099fcf671f12f5d278
SHA1b40fe16af3c1b4c986d0ec6a6984f27a142e9c7f
SHA25604044c4c46d8ae51784b2b2af68e4ed8b3b3ae3eb804b5c14586806fa6b995aa
SHA512411fd37577b93a9cb3e93f097ab89b93e6c443dd58bfbe8467c34b29e3b11987b275d8f19a955f7ea955471527ff1ae661af7c308111563cbc3a9024a6c771d4