Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
258s -
max time network
338s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe
Resource
win10v2004-20220812-en
General
-
Target
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe
-
Size
256KB
-
MD5
2689ae1d29f424425270ce563b5bc725
-
SHA1
966db0527364b87d94bcc2d6c6b42ec08531e7d0
-
SHA256
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520
-
SHA512
07403bdf801e3aaede66c56fca816faef249cd7e22fb173660fcda763495ed98c74c3b142d3ec131590f5ea4f0fc8313bf95b0b340f1da811d57fd6f9db79e32
-
SSDEEP
3072:gcnPoBqY+1kIJG/rhwow1wGQWDxy97g86X6dvYjoNWF1Wv0df+0jR57tn7:rPoBdfdKIWy7oENgWqxR57tn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bicol.exe -
Executes dropped EXE 1 IoCs
pid Process 764 bicol.exe -
Loads dropped DLL 2 IoCs
pid Process 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /X" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /e" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /E" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /o" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /m" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /N" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /w" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /I" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /f" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /h" bicol.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /H" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /V" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /O" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /n" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /i" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /D" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /x" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /A" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /Y" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /M" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /J" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /r" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /Z" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /B" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /j" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /q" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /k" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /a" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /y" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /d" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /S" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /U" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /u" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /W" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /G" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /l" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /p" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /v" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /s" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /c" bicol.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\bicol = "C:\\Users\\Admin\\bicol.exe /C" bicol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe 764 bicol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 764 bicol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 692 wrote to memory of 764 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 28 PID 692 wrote to memory of 764 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 28 PID 692 wrote to memory of 764 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 28 PID 692 wrote to memory of 764 692 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 28 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16 PID 764 wrote to memory of 692 764 bicol.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe"C:\Users\Admin\AppData\Local\Temp\a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\bicol.exe"C:\Users\Admin\bicol.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5aca87642c02e1e458700c74d9528529f
SHA19e3365d117b77a50f1aaab731ac492b8d84629f5
SHA256805a32c064f4127ca294830b4a10442ba5942ade7be6525429880a11d1df27ef
SHA51202d488bc379e3743307ac0a356a5487c420e545493f2058687eea8d600cbf9290ae971122fce21167e1f602ade1b4445ca8b64097843b03263c9e05c1f487a48
-
Filesize
256KB
MD5aca87642c02e1e458700c74d9528529f
SHA19e3365d117b77a50f1aaab731ac492b8d84629f5
SHA256805a32c064f4127ca294830b4a10442ba5942ade7be6525429880a11d1df27ef
SHA51202d488bc379e3743307ac0a356a5487c420e545493f2058687eea8d600cbf9290ae971122fce21167e1f602ade1b4445ca8b64097843b03263c9e05c1f487a48
-
Filesize
256KB
MD5aca87642c02e1e458700c74d9528529f
SHA19e3365d117b77a50f1aaab731ac492b8d84629f5
SHA256805a32c064f4127ca294830b4a10442ba5942ade7be6525429880a11d1df27ef
SHA51202d488bc379e3743307ac0a356a5487c420e545493f2058687eea8d600cbf9290ae971122fce21167e1f602ade1b4445ca8b64097843b03263c9e05c1f487a48
-
Filesize
256KB
MD5aca87642c02e1e458700c74d9528529f
SHA19e3365d117b77a50f1aaab731ac492b8d84629f5
SHA256805a32c064f4127ca294830b4a10442ba5942ade7be6525429880a11d1df27ef
SHA51202d488bc379e3743307ac0a356a5487c420e545493f2058687eea8d600cbf9290ae971122fce21167e1f602ade1b4445ca8b64097843b03263c9e05c1f487a48