Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe
Resource
win10v2004-20220812-en
General
-
Target
95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe
-
Size
240KB
-
MD5
3a23ef41df7e0d00c26f7c3d7276f77f
-
SHA1
34a2ccd0e7ce7a934a734fab4ae524ceccb3d905
-
SHA256
95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82
-
SHA512
41db59715d2fd7a782987c4490bcc5fbdd35c1b980e959bc923a19412cafd3864575c1b4e21970ee7fbfc958f054aa66a47d43d2a9b45c3b712b151edefa201c
-
SSDEEP
6144:ko55UtO7RQjX7XN1kd9JbSDviiopNDa/N08i1/W:44xNTW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zuuxees.exe -
Executes dropped EXE 1 IoCs
pid Process 1040 zuuxees.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /x" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /a" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /A" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /P" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /L" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /u" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /V" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /B" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /X" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /H" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /v" 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /G" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /K" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /w" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /h" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /f" zuuxees.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /R" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /d" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /M" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /j" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /t" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /i" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /q" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /I" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /D" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /m" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /s" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /U" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /v" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /r" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /o" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /W" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /O" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /E" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /T" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /J" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /Q" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /g" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /C" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /S" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /Z" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /y" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /Y" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /F" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /p" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /n" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /k" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /l" zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /b" zuuxees.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zuuxees.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuuxees = "C:\\Users\\Admin\\zuuxees.exe /e" zuuxees.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe 1040 zuuxees.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 1040 zuuxees.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1040 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 28 PID 1680 wrote to memory of 1040 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 28 PID 1680 wrote to memory of 1040 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 28 PID 1680 wrote to memory of 1040 1680 95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe"C:\Users\Admin\AppData\Local\Temp\95b1dd58529cef4cefbc247632e8d0065293132012c2c4467df2ab37317c5e82.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\zuuxees.exe"C:\Users\Admin\zuuxees.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5285f92171c61e20f33e7884f5c8d2b8a
SHA188a9098433cfd4cdce746ed3be10ae90c9cde0c8
SHA25633f18181754c1132e2a3fb1c643688f9ed85e7da77404b85fd5c45a51a294f86
SHA512805c4c1d59ae87055cc078c6a31fdc26da4f5d8a5729a705813eeb02b9c7065b691a552fcb3a78af89ef1b3fee382317cb130307ad21be627a2714e452e85d01
-
Filesize
240KB
MD5285f92171c61e20f33e7884f5c8d2b8a
SHA188a9098433cfd4cdce746ed3be10ae90c9cde0c8
SHA25633f18181754c1132e2a3fb1c643688f9ed85e7da77404b85fd5c45a51a294f86
SHA512805c4c1d59ae87055cc078c6a31fdc26da4f5d8a5729a705813eeb02b9c7065b691a552fcb3a78af89ef1b3fee382317cb130307ad21be627a2714e452e85d01
-
Filesize
240KB
MD5285f92171c61e20f33e7884f5c8d2b8a
SHA188a9098433cfd4cdce746ed3be10ae90c9cde0c8
SHA25633f18181754c1132e2a3fb1c643688f9ed85e7da77404b85fd5c45a51a294f86
SHA512805c4c1d59ae87055cc078c6a31fdc26da4f5d8a5729a705813eeb02b9c7065b691a552fcb3a78af89ef1b3fee382317cb130307ad21be627a2714e452e85d01
-
Filesize
240KB
MD5285f92171c61e20f33e7884f5c8d2b8a
SHA188a9098433cfd4cdce746ed3be10ae90c9cde0c8
SHA25633f18181754c1132e2a3fb1c643688f9ed85e7da77404b85fd5c45a51a294f86
SHA512805c4c1d59ae87055cc078c6a31fdc26da4f5d8a5729a705813eeb02b9c7065b691a552fcb3a78af89ef1b3fee382317cb130307ad21be627a2714e452e85d01