Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe
Resource
win10v2004-20221111-en
General
-
Target
0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe
-
Size
140KB
-
MD5
03ad175f6ba14fd44f890d617ff4a263
-
SHA1
4a3b9b5b685cefcb05aa633ee7c2aa85b01bb914
-
SHA256
0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5
-
SHA512
c78355c06ad1c6fd381e2300198aa1f68822fb08ee435aa674e2aa2bf48710e6ad8fd4e402b45518d7d1700435a24a8aa13c69c801e7cb7121b6d01577488870
-
SSDEEP
3072:FbsubuLuwgRkWwuXdzDwWX0fTIZOaA481GkQr+drjOBgqEqh:FPuTWwuXdzDwWX0fTIZOaAYkQrGrjOBq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mueanaj.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 mueanaj.exe -
Loads dropped DLL 2 IoCs
pid Process 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe -
Adds Run key to start application 2 TTPs 44 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /z" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /T" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /C" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /L" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /j" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /t" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /W" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /p" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /X" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /c" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /l" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /I" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /D" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /i" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /d" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /w" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /R" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /H" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /s" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /x" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /f" mueanaj.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /N" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /S" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /k" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /n" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /Y" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /B" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /A" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /b" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /o" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /e" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /F" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /J" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /V" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /P" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /g" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /y" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /E" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /m" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /v" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /U" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /Q" mueanaj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\mueanaj = "C:\\Users\\Admin\\mueanaj.exe /Z" mueanaj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe 1152 mueanaj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe 1152 mueanaj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 580 wrote to memory of 1152 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe 28 PID 580 wrote to memory of 1152 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe 28 PID 580 wrote to memory of 1152 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe 28 PID 580 wrote to memory of 1152 580 0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe"C:\Users\Admin\AppData\Local\Temp\0045a01a972803b6709bd1d276e8aa000d9870ae90cae0ef66c2f138b9e8bcc5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\mueanaj.exe"C:\Users\Admin\mueanaj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1152
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD58c73fb340de7189890e57bc41deaadde
SHA1bbfb63fcad736ff20483200ca72dd914d165b2c4
SHA25654c3d6543c94cdac58aba88e8ff52b79c1111cbca9355fcc6d40464c2a9e127f
SHA51203505dedefbec9c440e7f50092f71e49bab1e2f0ccfff539ac5e8ed8e55d4990d98808a7b82f875fc6a54f897565c374c9325994f6dd74a0b7c0e604eafecc8a
-
Filesize
140KB
MD58c73fb340de7189890e57bc41deaadde
SHA1bbfb63fcad736ff20483200ca72dd914d165b2c4
SHA25654c3d6543c94cdac58aba88e8ff52b79c1111cbca9355fcc6d40464c2a9e127f
SHA51203505dedefbec9c440e7f50092f71e49bab1e2f0ccfff539ac5e8ed8e55d4990d98808a7b82f875fc6a54f897565c374c9325994f6dd74a0b7c0e604eafecc8a
-
Filesize
140KB
MD58c73fb340de7189890e57bc41deaadde
SHA1bbfb63fcad736ff20483200ca72dd914d165b2c4
SHA25654c3d6543c94cdac58aba88e8ff52b79c1111cbca9355fcc6d40464c2a9e127f
SHA51203505dedefbec9c440e7f50092f71e49bab1e2f0ccfff539ac5e8ed8e55d4990d98808a7b82f875fc6a54f897565c374c9325994f6dd74a0b7c0e604eafecc8a
-
Filesize
140KB
MD58c73fb340de7189890e57bc41deaadde
SHA1bbfb63fcad736ff20483200ca72dd914d165b2c4
SHA25654c3d6543c94cdac58aba88e8ff52b79c1111cbca9355fcc6d40464c2a9e127f
SHA51203505dedefbec9c440e7f50092f71e49bab1e2f0ccfff539ac5e8ed8e55d4990d98808a7b82f875fc6a54f897565c374c9325994f6dd74a0b7c0e604eafecc8a