Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe
Resource
win10v2004-20220812-en
General
-
Target
2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe
-
Size
192KB
-
MD5
224026723b9d944d78a4276ca538f3da
-
SHA1
b5b0afeddd62db6d33f8c5dbf258cd3def0b88c6
-
SHA256
2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869
-
SHA512
97cb7139553f2b06d33c930616a2a5166cac587daf6d21c275af35d5bf42b4e8c5e39b9489a01b491554dc20ec16eee2127a3edacd33a1f675d199fc98453edd
-
SSDEEP
3072:yJfp+IqROnFm1F7QR8HRqTrRd7tJDicW34oaVnr5JUJpFnSTrONR:yJfi7QR8HadzW34oaVnNiJpF4Oz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ruaojez.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 ruaojez.exe -
Loads dropped DLL 2 IoCs
pid Process 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /o" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /u" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /R" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /c" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /O" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /y" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /e" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /T" ruaojez.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /p" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /b" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /Q" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /H" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /f" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /n" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /D" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /z" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /K" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /Y" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /E" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /a" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /I" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /t" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /r" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /d" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /X" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /G" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /s" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /h" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /C" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /P" ruaojez.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /B" 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /U" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /W" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /L" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /k" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /V" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /A" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /x" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /M" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /N" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /i" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /v" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /m" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /B" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /J" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /F" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /g" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /w" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /Z" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /l" ruaojez.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ruaojez = "C:\\Users\\Admin\\ruaojez.exe /j" ruaojez.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe 1556 ruaojez.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 1556 ruaojez.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 704 wrote to memory of 1556 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 27 PID 704 wrote to memory of 1556 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 27 PID 704 wrote to memory of 1556 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 27 PID 704 wrote to memory of 1556 704 2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe"C:\Users\Admin\AppData\Local\Temp\2ed5c1bc57a80154a9474f7572ba93c90dec1c75cef8f25243dbd7917f937869.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\ruaojez.exe"C:\Users\Admin\ruaojez.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5a5c4236d7ba24246e5c572908c5ac8a3
SHA15d1dd7c01b1aeb8454b26a2c3f0e28bcbb09c3b0
SHA256775e532b7916c7457fcdaa0707bda4910c3aebe6cfe7db9168da0788ba8ec990
SHA512108616d6ee7ab945749a44584d6fd838e0067b89c8ddbab164d9ffbf06b6319bd98f868b9c6db9d60319ad248780c211358065e762d3136ae5117f0ebcbb8bc9
-
Filesize
192KB
MD5a5c4236d7ba24246e5c572908c5ac8a3
SHA15d1dd7c01b1aeb8454b26a2c3f0e28bcbb09c3b0
SHA256775e532b7916c7457fcdaa0707bda4910c3aebe6cfe7db9168da0788ba8ec990
SHA512108616d6ee7ab945749a44584d6fd838e0067b89c8ddbab164d9ffbf06b6319bd98f868b9c6db9d60319ad248780c211358065e762d3136ae5117f0ebcbb8bc9
-
Filesize
192KB
MD5a5c4236d7ba24246e5c572908c5ac8a3
SHA15d1dd7c01b1aeb8454b26a2c3f0e28bcbb09c3b0
SHA256775e532b7916c7457fcdaa0707bda4910c3aebe6cfe7db9168da0788ba8ec990
SHA512108616d6ee7ab945749a44584d6fd838e0067b89c8ddbab164d9ffbf06b6319bd98f868b9c6db9d60319ad248780c211358065e762d3136ae5117f0ebcbb8bc9
-
Filesize
192KB
MD5a5c4236d7ba24246e5c572908c5ac8a3
SHA15d1dd7c01b1aeb8454b26a2c3f0e28bcbb09c3b0
SHA256775e532b7916c7457fcdaa0707bda4910c3aebe6cfe7db9168da0788ba8ec990
SHA512108616d6ee7ab945749a44584d6fd838e0067b89c8ddbab164d9ffbf06b6319bd98f868b9c6db9d60319ad248780c211358065e762d3136ae5117f0ebcbb8bc9