Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe
Resource
win10v2004-20220812-en
General
-
Target
eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe
-
Size
152KB
-
MD5
fad644ff815a163062309b3f4c921e8d
-
SHA1
c0fcdfc18dfbaddf439c582e5661887d5bde0d14
-
SHA256
eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c
-
SHA512
603434458633d95b084ad3876c5445a5b840e7a211b6aa9fcc99ab9e84ccd292f050f0101eb17af756426c4b70ad1c2772acbe0458c260d94551cddcb7486acb
-
SSDEEP
3072:Urdsw3SLk8KvAmRPveYlUq/kzPi0gEr+YsBYPAZ1KHiLwcIaZ154oQZiEkV:ACLrEGaUq8iHEXsCJR8ZdWs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaiasu.exe -
Executes dropped EXE 1 IoCs
pid Process 1076 zaiasu.exe -
Loads dropped DLL 2 IoCs
pid Process 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /L" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /X" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /P" eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /O" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /Y" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /A" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /B" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /l" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /q" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /R" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /f" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /T" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /g" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /p" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /x" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /v" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /M" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /U" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /z" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /n" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /W" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /d" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /a" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /K" zaiasu.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /G" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /Q" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /S" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /J" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /s" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /y" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /C" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /V" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /r" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /F" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /u" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /t" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /b" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /P" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /e" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /w" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /Z" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /m" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /c" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /H" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /k" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /I" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /i" zaiasu.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /h" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /j" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /E" zaiasu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaiasu = "C:\\Users\\Admin\\zaiasu.exe /D" zaiasu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe 1076 zaiasu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 1076 zaiasu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1076 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 28 PID 1772 wrote to memory of 1076 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 28 PID 1772 wrote to memory of 1076 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 28 PID 1772 wrote to memory of 1076 1772 eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe"C:\Users\Admin\AppData\Local\Temp\eb0b0aae02cdb9b7e089c1777c8b0812684999f0ad2494c8a7cb03c1654cdd6c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\zaiasu.exe"C:\Users\Admin\zaiasu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD568bf949fae3ad8cc31856386203feb33
SHA106180d0b6b5812acc0ed950abd5f4a18c1477d89
SHA256d1a38342e8dcf443d4fa6b2fb2315b664f0bab5b510b95f18475d6b47c90a735
SHA51227e3f9ccccd045aba73ba602838a2f68217f897284e4aa948de19c5449b377077e945a76ef250e963f705988b90848a642c2f5bbc8f332e8c05c185178b7f0aa
-
Filesize
152KB
MD568bf949fae3ad8cc31856386203feb33
SHA106180d0b6b5812acc0ed950abd5f4a18c1477d89
SHA256d1a38342e8dcf443d4fa6b2fb2315b664f0bab5b510b95f18475d6b47c90a735
SHA51227e3f9ccccd045aba73ba602838a2f68217f897284e4aa948de19c5449b377077e945a76ef250e963f705988b90848a642c2f5bbc8f332e8c05c185178b7f0aa
-
Filesize
152KB
MD568bf949fae3ad8cc31856386203feb33
SHA106180d0b6b5812acc0ed950abd5f4a18c1477d89
SHA256d1a38342e8dcf443d4fa6b2fb2315b664f0bab5b510b95f18475d6b47c90a735
SHA51227e3f9ccccd045aba73ba602838a2f68217f897284e4aa948de19c5449b377077e945a76ef250e963f705988b90848a642c2f5bbc8f332e8c05c185178b7f0aa
-
Filesize
152KB
MD568bf949fae3ad8cc31856386203feb33
SHA106180d0b6b5812acc0ed950abd5f4a18c1477d89
SHA256d1a38342e8dcf443d4fa6b2fb2315b664f0bab5b510b95f18475d6b47c90a735
SHA51227e3f9ccccd045aba73ba602838a2f68217f897284e4aa948de19c5449b377077e945a76ef250e963f705988b90848a642c2f5bbc8f332e8c05c185178b7f0aa