Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe
Resource
win10v2004-20220812-en
General
-
Target
cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe
-
Size
224KB
-
MD5
8fa633ec67995fb01b2b77fcd2cd8efd
-
SHA1
3933d22e37e478b7833c55f49996fa88937b9331
-
SHA256
cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b
-
SHA512
d53b0b145ad72448779e358967c6ef491625742464e394e7fe5a972a8b467e19a598a43761cf51f3d7b2a42b4626de9625ba0c19712ce50ad97a60d3f7cb3eb5
-
SSDEEP
6144:yDt4/OjgH82mi0y5+jx+FmByxyHaq+3VPokA+nbibwm:yJmO882mi0y5+jx+FmByxyHaq+3VPo73
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koisu.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 koisu.exe -
Loads dropped DLL 2 IoCs
pid Process 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /m" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /D" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /r" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /O" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /B" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /n" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /c" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /L" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /d" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /K" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /R" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /s" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /Q" cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /C" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /P" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /k" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /J" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /T" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /y" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /e" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /H" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /v" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /F" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /Z" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /j" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /N" koisu.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /Y" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /p" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /M" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /E" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /u" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /f" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /t" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /S" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /I" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /z" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /A" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /Q" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /i" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /b" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /G" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /V" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /o" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /l" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /q" koisu.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /X" koisu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\koisu = "C:\\Users\\Admin\\koisu.exe /g" koisu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe 1708 koisu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 1708 koisu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 940 wrote to memory of 1708 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 28 PID 940 wrote to memory of 1708 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 28 PID 940 wrote to memory of 1708 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 28 PID 940 wrote to memory of 1708 940 cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe"C:\Users\Admin\AppData\Local\Temp\cc1a6c835eb957f98034d10b43918c5f3a4ca30bec4aaa70fae740ca74c1549b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\koisu.exe"C:\Users\Admin\koisu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b370b416d3f260962099646b3252cb2b
SHA174682d18eba30e0c2b5aadf8ff39e3f8abc14031
SHA256c8c2085558eabc97068d54ee47fcc878c6ac11d6e9eaa54d101480fa72489104
SHA5125a93a733ad72a0029afc1fc4f05138027e30455f435dd96b81a26ca15c4d952651bee3c7869de4953d582af54d7f251f499198611619297369680691e02a5304
-
Filesize
224KB
MD5b370b416d3f260962099646b3252cb2b
SHA174682d18eba30e0c2b5aadf8ff39e3f8abc14031
SHA256c8c2085558eabc97068d54ee47fcc878c6ac11d6e9eaa54d101480fa72489104
SHA5125a93a733ad72a0029afc1fc4f05138027e30455f435dd96b81a26ca15c4d952651bee3c7869de4953d582af54d7f251f499198611619297369680691e02a5304
-
Filesize
224KB
MD5b370b416d3f260962099646b3252cb2b
SHA174682d18eba30e0c2b5aadf8ff39e3f8abc14031
SHA256c8c2085558eabc97068d54ee47fcc878c6ac11d6e9eaa54d101480fa72489104
SHA5125a93a733ad72a0029afc1fc4f05138027e30455f435dd96b81a26ca15c4d952651bee3c7869de4953d582af54d7f251f499198611619297369680691e02a5304
-
Filesize
224KB
MD5b370b416d3f260962099646b3252cb2b
SHA174682d18eba30e0c2b5aadf8ff39e3f8abc14031
SHA256c8c2085558eabc97068d54ee47fcc878c6ac11d6e9eaa54d101480fa72489104
SHA5125a93a733ad72a0029afc1fc4f05138027e30455f435dd96b81a26ca15c4d952651bee3c7869de4953d582af54d7f251f499198611619297369680691e02a5304