Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe
Resource
win10v2004-20221111-en
General
-
Target
b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe
-
Size
132KB
-
MD5
e15429cadcff8352d6559600d124c67a
-
SHA1
16ed1c5d8cf700a9b2edefba119fa262e24cc39e
-
SHA256
b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e
-
SHA512
e9a4954e65e3724174f628bcf1ffe94441f1784506709e4a263d75fc394d3fb589e66d736173d97fcedac77efcd73026d64326065fd4eb0e8be2a21a235cada5
-
SSDEEP
1536:57wVFjb0kWUBtizWywMsK8q72QNSqxAASKrSitUrN4oQ/hKeXsjEFTp+H7:5gLBtiJ772QNPPSK24oQZiEH+H7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jusig.exe -
Executes dropped EXE 1 IoCs
pid Process 3124 jusig.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /g" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /T" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /x" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /n" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /Q" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /L" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /j" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /f" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /B" jusig.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /u" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /d" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /s" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /m" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /I" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /q" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /G" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /P" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /Y" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /V" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /h" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /i" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /Z" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /W" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /J" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /D" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /S" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /F" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /N" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /r" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /E" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /w" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /c" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /k" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /o" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /y" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /t" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /l" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /p" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /A" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /U" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /z" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /M" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /O" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /R" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /v" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /e" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /a" b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /H" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /K" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /b" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /X" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /C" jusig.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jusig = "C:\\Users\\Admin\\jusig.exe /a" jusig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe 2760 b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe 3124 jusig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe 3124 jusig.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3124 2760 b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe 82 PID 2760 wrote to memory of 3124 2760 b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe 82 PID 2760 wrote to memory of 3124 2760 b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe"C:\Users\Admin\AppData\Local\Temp\b8fd9913d659855d7290e9595a164c2d78a5e1f7273990c6fd3a48bc8cf6078e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\jusig.exe"C:\Users\Admin\jusig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5b13edd6c99fb3b454dc8ac9c71d8a006
SHA108abd093debe56007b3cfa1580a69b9bf8a89d99
SHA256863311875e0718e47e93123f282ac8a0d8c7675afe97a61478f36e3658d33c85
SHA51294d41042d4be3fc5efd5d5f2a846e850de0c9b59f63a574c0ee1c1ca6ddc85d6802d7e31bd188d990d84284a788b22f25d78e1000b6c1b4e7646f4e707dfa3c4
-
Filesize
132KB
MD5b13edd6c99fb3b454dc8ac9c71d8a006
SHA108abd093debe56007b3cfa1580a69b9bf8a89d99
SHA256863311875e0718e47e93123f282ac8a0d8c7675afe97a61478f36e3658d33c85
SHA51294d41042d4be3fc5efd5d5f2a846e850de0c9b59f63a574c0ee1c1ca6ddc85d6802d7e31bd188d990d84284a788b22f25d78e1000b6c1b4e7646f4e707dfa3c4