Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
42e33bb0b0f1efcdeb8742d674cd6806.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42e33bb0b0f1efcdeb8742d674cd6806.exe
Resource
win10v2004-20231215-en
General
-
Target
42e33bb0b0f1efcdeb8742d674cd6806.exe
-
Size
192KB
-
MD5
42e33bb0b0f1efcdeb8742d674cd6806
-
SHA1
d1def2f9ac899c9179379044bfa012eb8d7d8a9a
-
SHA256
702aabd9e92b32e304ae61d2df9708c87990cb493f5cce4212f7b1e1781be3c3
-
SHA512
b58132660ff1dcb8c062301c0429b74e0225b3f917240338b2d247279dbee7a452ca13b19304259450029ecb610bbe77be70339808cdfc3719ce3c26e69f0b07
-
SSDEEP
3072:u948xI4/MJROnFnklHC5CTx0/Uqkf/9CUI5l7dp7LVMX1Wn84ogUR8ISTrOcO:uY4JMHCs3hbIBp3VMX1WBUR8dOV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 42e33bb0b0f1efcdeb8742d674cd6806.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fuiizu.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 fuiizu.exe -
Loads dropped DLL 2 IoCs
pid Process 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /s" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /c" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /C" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /q" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /T" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /U" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /F" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /o" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /L" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /G" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /r" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /Q" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /R" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /P" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /H" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /J" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /V" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /A" 42e33bb0b0f1efcdeb8742d674cd6806.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /j" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /Z" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /x" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /g" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /f" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /N" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /X" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /a" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /n" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /W" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /m" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /Y" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /E" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /K" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /B" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /t" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /d" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /I" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /z" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /D" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /w" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /e" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /p" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /M" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /S" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /b" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /k" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /h" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /A" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /l" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /v" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /y" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /O" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /u" fuiizu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\fuiizu = "C:\\Users\\Admin\\fuiizu.exe /i" fuiizu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe 2644 fuiizu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 2644 fuiizu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2644 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 28 PID 2992 wrote to memory of 2644 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 28 PID 2992 wrote to memory of 2644 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 28 PID 2992 wrote to memory of 2644 2992 42e33bb0b0f1efcdeb8742d674cd6806.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e33bb0b0f1efcdeb8742d674cd6806.exe"C:\Users\Admin\AppData\Local\Temp\42e33bb0b0f1efcdeb8742d674cd6806.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\fuiizu.exe"C:\Users\Admin\fuiizu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5ae32ac08652e04b1740085b42c14a6ed
SHA17ad5d7b18aca5a2700a6ffd1353747e7f52ee0cc
SHA2561224602b53f54af5f449caf10d9dbbabc9fb23e86690473a4a7461145186092a
SHA5121807828d8afd73983d0ec2a92227ffbfe866aada1f62e4237413916126bf332fef5dd667976868d77fb5fe133c7ddfe254843c142eafe21f79f0715ba161fe3b