Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2022, 10:43

General

  • Target

    cd0156a292ab30feb1503fc1bde45dfa849d947c116ed17a1520923f7e19ed15.exe

  • Size

    255KB

  • MD5

    041517df62f8e841367468104014d91a

  • SHA1

    469d197f59194f70a58941921de4c14c86f4dceb

  • SHA256

    cd0156a292ab30feb1503fc1bde45dfa849d947c116ed17a1520923f7e19ed15

  • SHA512

    0ae84ae5977380d411ba41917c94446a98361dcff643cb952a69317e925470dcc0e18c5069b2be49e0a08e8eeb43343466815bdab5d438a0ca7d71aa0f017d66

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJH:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI2

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd0156a292ab30feb1503fc1bde45dfa849d947c116ed17a1520923f7e19ed15.exe
    "C:\Users\Admin\AppData\Local\Temp\cd0156a292ab30feb1503fc1bde45dfa849d947c116ed17a1520923f7e19ed15.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\jhhbbvlxno.exe
      jhhbbvlxno.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\SysWOW64\qglkiver.exe
        C:\Windows\system32\qglkiver.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1504
    • C:\Windows\SysWOW64\sbkcccbhfwttcda.exe
      sbkcccbhfwttcda.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c drbxbxdvesrwj.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:708
        • C:\Windows\SysWOW64\drbxbxdvesrwj.exe
          drbxbxdvesrwj.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1372
    • C:\Windows\SysWOW64\qglkiver.exe
      qglkiver.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1104
    • C:\Windows\SysWOW64\drbxbxdvesrwj.exe
      drbxbxdvesrwj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1344
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1912

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      fe2397b175615a06d437cfcbb016d15d

      SHA1

      10b7ae422cf8d1a967d5992eed48c4bb3978cc94

      SHA256

      09aab99af37940233b9621cedd18301558a194afe2aec68b1e75dbbe814a22d3

      SHA512

      504c7ac4055784472b05eb8539ba9c5bbb79151bf4543353033cb33886be02c91f92d8e7442d38c9cbf5aeb1fd99e7a993f47246c5b432e0484290466de71f62

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      e218ccd65a1ec001939cd8e87e8b0625

      SHA1

      99d1cba89ca028bf7b703514898b49c6351ff69e

      SHA256

      3fe546e9ec30441a2c57250779d1d8a3a4f2b4a84dd2babffc1b0c946123fe87

      SHA512

      19764849ea402e1d14f99b94e1b84bc363ad90182817ee7351bddc5143ff59284ecaed82bcb0d0aa5b4207744a2a04a712ec5683e0f15a3d3bef9ceb34006904

    • C:\Users\Admin\Documents\CompareLock.doc.exe

      Filesize

      255KB

      MD5

      e229c8e696befc4e1124ae5a43075129

      SHA1

      73cdea46af78ee10a88448fd304f7aaa064d49ae

      SHA256

      cbdc034f4227d89b2309d9d9f974eed2990869e977455aa0939813aa381f06e1

      SHA512

      665381ebf7b61ad6bd253953e11ff5b0446637ae5be8ed6ab15e7d9ddb1eb60ca68c9025054b68b3ac0a7ce6933c1013a9da1becbac4f6125bf07558bf11f907

    • C:\Users\Admin\Music\RemoveUnpublish.doc.exe

      Filesize

      255KB

      MD5

      4ad4887df992a88850a3c3dcc94979b7

      SHA1

      1df1b76861f759718e426bb5a67c639c4a775a23

      SHA256

      73605cc35573fe0269d09a7636da14534873d51b820890548b0547984ea1c7cf

      SHA512

      7816deb4dab32af05ab46d6de3371f6298abb2c90b0ddeafce9f4628d7da83d54d70fddc5b7e68b1009c92b51a6ebd2a69f25b829236f8eead195d580999ebf8

    • C:\Windows\SysWOW64\drbxbxdvesrwj.exe

      Filesize

      255KB

      MD5

      c719e4442b92363bc523aa9bdde02e25

      SHA1

      41217499a4dcf25a0c758ce9965e3ce8ef92f664

      SHA256

      2169e9d7c6a99560db0dbd8849877bc99ef58971a835563bbf0c3f3c19ffa024

      SHA512

      c8b73f35355dfae07de1d4bc40aeaa733a0d20f2058d35411e1f994fda6c89db39f35451faecd573d84c1ed1e238fec7856b7d6b9d03b45d069cfc3d40471b8f

    • C:\Windows\SysWOW64\drbxbxdvesrwj.exe

      Filesize

      255KB

      MD5

      c719e4442b92363bc523aa9bdde02e25

      SHA1

      41217499a4dcf25a0c758ce9965e3ce8ef92f664

      SHA256

      2169e9d7c6a99560db0dbd8849877bc99ef58971a835563bbf0c3f3c19ffa024

      SHA512

      c8b73f35355dfae07de1d4bc40aeaa733a0d20f2058d35411e1f994fda6c89db39f35451faecd573d84c1ed1e238fec7856b7d6b9d03b45d069cfc3d40471b8f

    • C:\Windows\SysWOW64\drbxbxdvesrwj.exe

      Filesize

      255KB

      MD5

      c719e4442b92363bc523aa9bdde02e25

      SHA1

      41217499a4dcf25a0c758ce9965e3ce8ef92f664

      SHA256

      2169e9d7c6a99560db0dbd8849877bc99ef58971a835563bbf0c3f3c19ffa024

      SHA512

      c8b73f35355dfae07de1d4bc40aeaa733a0d20f2058d35411e1f994fda6c89db39f35451faecd573d84c1ed1e238fec7856b7d6b9d03b45d069cfc3d40471b8f

    • C:\Windows\SysWOW64\jhhbbvlxno.exe

      Filesize

      255KB

      MD5

      55e56f498ebac3b9343ec7b52e4e3611

      SHA1

      e698d7a008e4453dee4109ce7694c929f58b6549

      SHA256

      453e5594280fa0cc5dfa666c462166a42d384a663072eeb69885108712c7ea5f

      SHA512

      1c63b3194a3dd645193e23711af2b886919cce0812fd5c1625e3904a0a95533977cb3fa6e9e59eb6cc80480040cc13398ddd13990ed3da312088bb9c57e9a897

    • C:\Windows\SysWOW64\jhhbbvlxno.exe

      Filesize

      255KB

      MD5

      55e56f498ebac3b9343ec7b52e4e3611

      SHA1

      e698d7a008e4453dee4109ce7694c929f58b6549

      SHA256

      453e5594280fa0cc5dfa666c462166a42d384a663072eeb69885108712c7ea5f

      SHA512

      1c63b3194a3dd645193e23711af2b886919cce0812fd5c1625e3904a0a95533977cb3fa6e9e59eb6cc80480040cc13398ddd13990ed3da312088bb9c57e9a897

    • C:\Windows\SysWOW64\qglkiver.exe

      Filesize

      255KB

      MD5

      7343afbfa29eb8f4a5e5a62829b55e5a

      SHA1

      4075ad569234535ff5ce5f48f976e30d2e7e81e1

      SHA256

      460882503c835ff30e039be82abb29ba9806fa179c6aaa77a77f4835cf60cf50

      SHA512

      a91567bd0dbb3935f1da4db92cf6ce67aa89562de4f8d04963ae78c6487366d275ba3d4288952ed817f4f9c56ab50e9e8252d7b14b96397512f6e6ab21d3c156

    • C:\Windows\SysWOW64\qglkiver.exe

      Filesize

      255KB

      MD5

      7343afbfa29eb8f4a5e5a62829b55e5a

      SHA1

      4075ad569234535ff5ce5f48f976e30d2e7e81e1

      SHA256

      460882503c835ff30e039be82abb29ba9806fa179c6aaa77a77f4835cf60cf50

      SHA512

      a91567bd0dbb3935f1da4db92cf6ce67aa89562de4f8d04963ae78c6487366d275ba3d4288952ed817f4f9c56ab50e9e8252d7b14b96397512f6e6ab21d3c156

    • C:\Windows\SysWOW64\qglkiver.exe

      Filesize

      255KB

      MD5

      7343afbfa29eb8f4a5e5a62829b55e5a

      SHA1

      4075ad569234535ff5ce5f48f976e30d2e7e81e1

      SHA256

      460882503c835ff30e039be82abb29ba9806fa179c6aaa77a77f4835cf60cf50

      SHA512

      a91567bd0dbb3935f1da4db92cf6ce67aa89562de4f8d04963ae78c6487366d275ba3d4288952ed817f4f9c56ab50e9e8252d7b14b96397512f6e6ab21d3c156

    • C:\Windows\SysWOW64\sbkcccbhfwttcda.exe

      Filesize

      255KB

      MD5

      d67ab745d84700e0d2382bee2b9d0e45

      SHA1

      cbe009b756f3cc9828cac23d19142a71dc242759

      SHA256

      0f757decde4c123b7316ba153fc3013db723d40f1f7e179b7553da78978ae8b5

      SHA512

      0429f32f179b834839937f3ec4ffe5e65f81ed45c58762e120e91afdb5b69d662a163c6e4145c7855568031ebec5602f02a79d08fdf720c6280b7e4939318954

    • C:\Windows\SysWOW64\sbkcccbhfwttcda.exe

      Filesize

      255KB

      MD5

      d67ab745d84700e0d2382bee2b9d0e45

      SHA1

      cbe009b756f3cc9828cac23d19142a71dc242759

      SHA256

      0f757decde4c123b7316ba153fc3013db723d40f1f7e179b7553da78978ae8b5

      SHA512

      0429f32f179b834839937f3ec4ffe5e65f81ed45c58762e120e91afdb5b69d662a163c6e4145c7855568031ebec5602f02a79d08fdf720c6280b7e4939318954

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\drbxbxdvesrwj.exe

      Filesize

      255KB

      MD5

      c719e4442b92363bc523aa9bdde02e25

      SHA1

      41217499a4dcf25a0c758ce9965e3ce8ef92f664

      SHA256

      2169e9d7c6a99560db0dbd8849877bc99ef58971a835563bbf0c3f3c19ffa024

      SHA512

      c8b73f35355dfae07de1d4bc40aeaa733a0d20f2058d35411e1f994fda6c89db39f35451faecd573d84c1ed1e238fec7856b7d6b9d03b45d069cfc3d40471b8f

    • \Windows\SysWOW64\drbxbxdvesrwj.exe

      Filesize

      255KB

      MD5

      c719e4442b92363bc523aa9bdde02e25

      SHA1

      41217499a4dcf25a0c758ce9965e3ce8ef92f664

      SHA256

      2169e9d7c6a99560db0dbd8849877bc99ef58971a835563bbf0c3f3c19ffa024

      SHA512

      c8b73f35355dfae07de1d4bc40aeaa733a0d20f2058d35411e1f994fda6c89db39f35451faecd573d84c1ed1e238fec7856b7d6b9d03b45d069cfc3d40471b8f

    • \Windows\SysWOW64\jhhbbvlxno.exe

      Filesize

      255KB

      MD5

      55e56f498ebac3b9343ec7b52e4e3611

      SHA1

      e698d7a008e4453dee4109ce7694c929f58b6549

      SHA256

      453e5594280fa0cc5dfa666c462166a42d384a663072eeb69885108712c7ea5f

      SHA512

      1c63b3194a3dd645193e23711af2b886919cce0812fd5c1625e3904a0a95533977cb3fa6e9e59eb6cc80480040cc13398ddd13990ed3da312088bb9c57e9a897

    • \Windows\SysWOW64\qglkiver.exe

      Filesize

      255KB

      MD5

      7343afbfa29eb8f4a5e5a62829b55e5a

      SHA1

      4075ad569234535ff5ce5f48f976e30d2e7e81e1

      SHA256

      460882503c835ff30e039be82abb29ba9806fa179c6aaa77a77f4835cf60cf50

      SHA512

      a91567bd0dbb3935f1da4db92cf6ce67aa89562de4f8d04963ae78c6487366d275ba3d4288952ed817f4f9c56ab50e9e8252d7b14b96397512f6e6ab21d3c156

    • \Windows\SysWOW64\qglkiver.exe

      Filesize

      255KB

      MD5

      7343afbfa29eb8f4a5e5a62829b55e5a

      SHA1

      4075ad569234535ff5ce5f48f976e30d2e7e81e1

      SHA256

      460882503c835ff30e039be82abb29ba9806fa179c6aaa77a77f4835cf60cf50

      SHA512

      a91567bd0dbb3935f1da4db92cf6ce67aa89562de4f8d04963ae78c6487366d275ba3d4288952ed817f4f9c56ab50e9e8252d7b14b96397512f6e6ab21d3c156

    • \Windows\SysWOW64\sbkcccbhfwttcda.exe

      Filesize

      255KB

      MD5

      d67ab745d84700e0d2382bee2b9d0e45

      SHA1

      cbe009b756f3cc9828cac23d19142a71dc242759

      SHA256

      0f757decde4c123b7316ba153fc3013db723d40f1f7e179b7553da78978ae8b5

      SHA512

      0429f32f179b834839937f3ec4ffe5e65f81ed45c58762e120e91afdb5b69d662a163c6e4145c7855568031ebec5602f02a79d08fdf720c6280b7e4939318954

    • memory/1104-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1104-88-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1340-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1340-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1344-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1344-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1372-91-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1372-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1504-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1504-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1696-85-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1696-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1780-94-0x0000000072021000-0x0000000072024000-memory.dmp

      Filesize

      12KB

    • memory/1780-113-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1780-114-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/1780-95-0x000000006FAA1000-0x000000006FAA3000-memory.dmp

      Filesize

      8KB

    • memory/1780-106-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/1780-98-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/1780-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1900-93-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1900-55-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1900-54-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

      Filesize

      8KB

    • memory/1900-86-0x00000000023B0000-0x0000000002450000-memory.dmp

      Filesize

      640KB

    • memory/1912-112-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp

      Filesize

      8KB