Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe
Resource
win10v2004-20221111-en
General
-
Target
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe
-
Size
156KB
-
MD5
83dff9135ef3c793b2f6c170b2c46937
-
SHA1
d34c5efc61547948c7caa8a05fb422d1d56bb041
-
SHA256
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02
-
SHA512
f0b188742cd28610943daba6a4ab54e9a01dbf5a68824e61711bfdce9f73feb5e2aece252f16eb945dff2e05a202d44398427d6bcc3e7cd05eaab540e74a29c1
-
SSDEEP
3072:mnoxLFxOpMS7yJuu4TrVlpT3rZy93E3ipMdIyH+Y8DuA2IXTg4oQZiEn6:JxNfJuu4l3rZy93UipMd9+Y8DuYAWw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xuuizo.exe -
Executes dropped EXE 1 IoCs
pid Process 1512 xuuizo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /C" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /W" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /h" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /I" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /F" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /y" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /P" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /L" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /x" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /H" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /g" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /A" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /T" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /e" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /E" xuuizo.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /X" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /Y" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /Z" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /n" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /d" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /b" aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /l" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /K" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /V" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /Q" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /j" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /G" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /k" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /q" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /m" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /M" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /J" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /v" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /c" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /b" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /U" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /u" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /z" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /S" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /f" xuuizo.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /R" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /r" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /a" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /O" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /o" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /B" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /i" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /t" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /s" xuuizo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xuuizo = "C:\\Users\\Admin\\xuuizo.exe /p" xuuizo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1188 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 1188 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe 1512 xuuizo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1188 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 1512 xuuizo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1512 1188 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 88 PID 1188 wrote to memory of 1512 1188 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 88 PID 1188 wrote to memory of 1512 1188 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe"C:\Users\Admin\AppData\Local\Temp\aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\xuuizo.exe"C:\Users\Admin\xuuizo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD53fe59e15245070537e451d18584a00dd
SHA15b2117f6a4fc90571adfdbb37e79ee50bf3ec01a
SHA2567cdb95551c01bdc794e3fe739dd9979ca8acba98dc4dd130981bfa30ada7ae32
SHA512dff99bf5ce86776328f8ebfbefc0bd3d5f41991fe9ad0b17411d7bfbd6fa0fa583610ca0701bef9698e1472feadfb209cb08e38aac6f43230159f1328a9927b6
-
Filesize
156KB
MD53fe59e15245070537e451d18584a00dd
SHA15b2117f6a4fc90571adfdbb37e79ee50bf3ec01a
SHA2567cdb95551c01bdc794e3fe739dd9979ca8acba98dc4dd130981bfa30ada7ae32
SHA512dff99bf5ce86776328f8ebfbefc0bd3d5f41991fe9ad0b17411d7bfbd6fa0fa583610ca0701bef9698e1472feadfb209cb08e38aac6f43230159f1328a9927b6