Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe
Resource
win10v2004-20220812-en
General
-
Target
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe
-
Size
232KB
-
MD5
5574f7c11369e28e9fce030385b00ccc
-
SHA1
279bbae4c93247c8c959cd5776a78735df60902c
-
SHA256
64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766
-
SHA512
30097d0711f3708b9d797aa2f4713b0293322e903e780ebaf1a43b800386da1319ee5ee05a8626dd959edf4ecf3ad0a7688d32f25cb91bf39d387b0ec2381191
-
SSDEEP
3072:jgXVlhx5v2gKvvyMZe+EVv64QWCyiHCqV/G0/J:ifKHyMwhVv6vWCyiHCqV/G0x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaeetom.exe -
Executes dropped EXE 1 IoCs
pid Process 268 zaeetom.exe -
Loads dropped DLL 2 IoCs
pid Process 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /j" 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /s" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /p" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /i" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /g" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /o" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /h" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /r" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /x" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /a" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /m" zaeetom.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /q" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /z" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /d" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /c" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /n" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /k" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /t" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /v" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /f" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /l" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /b" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /w" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /y" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /u" zaeetom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /e" zaeetom.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaeetom = "C:\\Users\\Admin\\zaeetom.exe /j" zaeetom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe 268 zaeetom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 268 zaeetom.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 896 wrote to memory of 268 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 28 PID 896 wrote to memory of 268 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 28 PID 896 wrote to memory of 268 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 28 PID 896 wrote to memory of 268 896 64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe"C:\Users\Admin\AppData\Local\Temp\64891be44ea4a4499265f6cc659b5d112eb6ba83e61f24dfeb405a6e05c61766.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\zaeetom.exe"C:\Users\Admin\zaeetom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5226b8b5bad730fa4b90e2a37eb799b53
SHA1cc1ba902155bc4319ebb154a4768125bc93a90d6
SHA256cee2533306c0f0535c18420ee5494623d4e198058a1f485f2e6e9ec0a1ec62b2
SHA51297fc52f8bbed79e4f94468a43a5e6f6755363d9b7e2ea097a7f80f47dabe41daa4efb058f2406da86f72507af4846f463a42b565c49f10f738b5094ec9123a25
-
Filesize
232KB
MD5226b8b5bad730fa4b90e2a37eb799b53
SHA1cc1ba902155bc4319ebb154a4768125bc93a90d6
SHA256cee2533306c0f0535c18420ee5494623d4e198058a1f485f2e6e9ec0a1ec62b2
SHA51297fc52f8bbed79e4f94468a43a5e6f6755363d9b7e2ea097a7f80f47dabe41daa4efb058f2406da86f72507af4846f463a42b565c49f10f738b5094ec9123a25
-
Filesize
232KB
MD5226b8b5bad730fa4b90e2a37eb799b53
SHA1cc1ba902155bc4319ebb154a4768125bc93a90d6
SHA256cee2533306c0f0535c18420ee5494623d4e198058a1f485f2e6e9ec0a1ec62b2
SHA51297fc52f8bbed79e4f94468a43a5e6f6755363d9b7e2ea097a7f80f47dabe41daa4efb058f2406da86f72507af4846f463a42b565c49f10f738b5094ec9123a25
-
Filesize
232KB
MD5226b8b5bad730fa4b90e2a37eb799b53
SHA1cc1ba902155bc4319ebb154a4768125bc93a90d6
SHA256cee2533306c0f0535c18420ee5494623d4e198058a1f485f2e6e9ec0a1ec62b2
SHA51297fc52f8bbed79e4f94468a43a5e6f6755363d9b7e2ea097a7f80f47dabe41daa4efb058f2406da86f72507af4846f463a42b565c49f10f738b5094ec9123a25