Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe
Resource
win10v2004-20240508-en
General
-
Target
e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe
-
Size
148KB
-
MD5
55a0e9bc768372bda876533d5bb8e0fe
-
SHA1
d78298df9288c585b226ae674ec031c303b8f295
-
SHA256
e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97
-
SHA512
89f52d6348fecf09685ee43b7e978396cfd14fcb5e2e64142eeb6487d23fb255e7404b4fb7f42e49b575f3b075221cd38c87bf6558d271a767ef4345b825722a
-
SSDEEP
3072:xK5BVnzPVigj6G7gW1lktdVbKPkKE9qKIu64oQZiEvhdc:CBVz9Fj7b1eDvXI3WLu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xodor.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe -
Executes dropped EXE 1 IoCs
pid Process 1448 xodor.exe -
Loads dropped DLL 2 IoCs
pid Process 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /u" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /q" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /U" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /Y" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /G" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /l" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /d" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /X" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /t" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /e" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /D" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /m" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /E" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /Q" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /w" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /H" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /W" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /V" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /z" e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /c" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /z" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /O" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /K" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /y" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /I" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /S" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /Z" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /N" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /o" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /k" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /s" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /J" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /j" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /L" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /B" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /b" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /M" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /T" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /g" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /r" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /R" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /p" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /f" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /a" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /x" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /v" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /A" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /i" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /P" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /n" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /C" xodor.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xodor = "C:\\Users\\Admin\\xodor.exe /F" xodor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe 1448 xodor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 1448 xodor.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1448 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 28 PID 1420 wrote to memory of 1448 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 28 PID 1420 wrote to memory of 1448 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 28 PID 1420 wrote to memory of 1448 1420 e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe"C:\Users\Admin\AppData\Local\Temp\e934bf4e4bdddc3cc4ff494563b8a9df57bde1c7f61a8681b44d4770f41eef97.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\xodor.exe"C:\Users\Admin\xodor.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD504979d3c2c9d10dd32047183a86cbb43
SHA159d81093a3f82b4b6ce11c6ef823565a13f40fc1
SHA2569045c8c2dfc7d1ded7ef1dd388d054cbe0905e973b2d45e4ce275e915cb99b46
SHA512b762c925f45e2dc0980bd53006732864db1a2820f9b270376ae5721c035759ca7977b4bbdfd60bd1717ea6f14f813e975b2e289ffc3afb07617f7841c29b03ad