Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 16:42

General

  • Target

    c4c4bdf560a1675c1885f97c38d2e45497992fd20f6f38425514998f26f15fa4.exe

  • Size

    256KB

  • MD5

    a38ae7b8057be4f40b876cc1a3a4abe0

  • SHA1

    fb10c7ec9370cc72111560ee8abbe7db3f8202a6

  • SHA256

    c4c4bdf560a1675c1885f97c38d2e45497992fd20f6f38425514998f26f15fa4

  • SHA512

    7b142c6d848e9de74f32be7e6528de3d8f542ea7cef3a243ea1454360401789029f9f296608df71b3b33f07e5e81cc95d09607a52fd8a43f06d7659fabdc7f65

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBWFv6X:Plf5j6zCNa0xeE3mC

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4c4bdf560a1675c1885f97c38d2e45497992fd20f6f38425514998f26f15fa4.exe
    "C:\Users\Admin\AppData\Local\Temp\c4c4bdf560a1675c1885f97c38d2e45497992fd20f6f38425514998f26f15fa4.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\SysWOW64\dmunkluqnp.exe
      dmunkluqnp.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Windows\SysWOW64\ivdfpbul.exe
        C:\Windows\system32\ivdfpbul.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4312
    • C:\Windows\SysWOW64\ivdfpbul.exe
      ivdfpbul.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:740
    • C:\Windows\SysWOW64\ogiguwybqojmgiz.exe
      ogiguwybqojmgiz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2200
    • C:\Windows\SysWOW64\ssgvgzzarmwhu.exe
      ssgvgzzarmwhu.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:628
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\dmunkluqnp.exe

    Filesize

    256KB

    MD5

    12aaddc78c8e9721b95f9da19cea38fd

    SHA1

    fcc4d389701f96a310badb5ab3b0f22b93f50fa9

    SHA256

    42ea0f2117b42478173073298ea837709b9fed2f7e2c49471540e08286f790f1

    SHA512

    ca5bed987ccd467f2fbaecd4c07908e2b1270ab1b0bb7899753af93c83622a00d1e92b34bda92a59bc127aa598653fa58f5d9343ffbfabe3aa44cbcea335ef33

  • C:\Windows\SysWOW64\dmunkluqnp.exe

    Filesize

    256KB

    MD5

    12aaddc78c8e9721b95f9da19cea38fd

    SHA1

    fcc4d389701f96a310badb5ab3b0f22b93f50fa9

    SHA256

    42ea0f2117b42478173073298ea837709b9fed2f7e2c49471540e08286f790f1

    SHA512

    ca5bed987ccd467f2fbaecd4c07908e2b1270ab1b0bb7899753af93c83622a00d1e92b34bda92a59bc127aa598653fa58f5d9343ffbfabe3aa44cbcea335ef33

  • C:\Windows\SysWOW64\ivdfpbul.exe

    Filesize

    256KB

    MD5

    510064142ccd56c30a700781d01546a7

    SHA1

    5c48f0acec92d49dc801248e2223d655aeb6d87d

    SHA256

    69d9f2c2e9f3f4bf7a53cd3e8e3c5118b1d226b7c59df033120c5da87b21293b

    SHA512

    4d3af734d1d698f28fa73b4e1f2c7c75204fa7f59d92fcf767f7a7de01f068eab9a52f23471940083183e3c913ba59a7171f4753b6aedaa0ede8fcfee51e640f

  • C:\Windows\SysWOW64\ivdfpbul.exe

    Filesize

    256KB

    MD5

    510064142ccd56c30a700781d01546a7

    SHA1

    5c48f0acec92d49dc801248e2223d655aeb6d87d

    SHA256

    69d9f2c2e9f3f4bf7a53cd3e8e3c5118b1d226b7c59df033120c5da87b21293b

    SHA512

    4d3af734d1d698f28fa73b4e1f2c7c75204fa7f59d92fcf767f7a7de01f068eab9a52f23471940083183e3c913ba59a7171f4753b6aedaa0ede8fcfee51e640f

  • C:\Windows\SysWOW64\ivdfpbul.exe

    Filesize

    256KB

    MD5

    510064142ccd56c30a700781d01546a7

    SHA1

    5c48f0acec92d49dc801248e2223d655aeb6d87d

    SHA256

    69d9f2c2e9f3f4bf7a53cd3e8e3c5118b1d226b7c59df033120c5da87b21293b

    SHA512

    4d3af734d1d698f28fa73b4e1f2c7c75204fa7f59d92fcf767f7a7de01f068eab9a52f23471940083183e3c913ba59a7171f4753b6aedaa0ede8fcfee51e640f

  • C:\Windows\SysWOW64\ogiguwybqojmgiz.exe

    Filesize

    256KB

    MD5

    2149702d66518faf0afa7230f30ba485

    SHA1

    ac169d48b79087f5ecbad924ab60eb22b51e8ff1

    SHA256

    df28c9387c7466eaab66379e62edbc13483569ee1ae13ecbf3c1b31144a97120

    SHA512

    0bb39d56edb057ebb4f1119bbbbb05a2f35688f1e48b202bd48e661c26108970ea9f655358e3af9d47196f83a1174178e5d84cfcef59b9b1cad89753d4dd13e1

  • C:\Windows\SysWOW64\ogiguwybqojmgiz.exe

    Filesize

    256KB

    MD5

    2149702d66518faf0afa7230f30ba485

    SHA1

    ac169d48b79087f5ecbad924ab60eb22b51e8ff1

    SHA256

    df28c9387c7466eaab66379e62edbc13483569ee1ae13ecbf3c1b31144a97120

    SHA512

    0bb39d56edb057ebb4f1119bbbbb05a2f35688f1e48b202bd48e661c26108970ea9f655358e3af9d47196f83a1174178e5d84cfcef59b9b1cad89753d4dd13e1

  • C:\Windows\SysWOW64\ssgvgzzarmwhu.exe

    Filesize

    256KB

    MD5

    ce9c939617bc3c4e0c09470670386657

    SHA1

    a9e96495ca2bb7b93e9d4c91ada3ba75a8df8fe9

    SHA256

    4aa24a4137603a0fb31ed6ce24f6f372928f5df3c684faab1eb5e739728e610a

    SHA512

    16fd22a5ec5857471f6cfba5a481e9a55200d9c5900d1625fe14b6092308df6066a7e6274d4ecf1f2a28e188cded66e1ca5ee0c323edfcc1033d6c9186fa43c3

  • C:\Windows\SysWOW64\ssgvgzzarmwhu.exe

    Filesize

    256KB

    MD5

    ce9c939617bc3c4e0c09470670386657

    SHA1

    a9e96495ca2bb7b93e9d4c91ada3ba75a8df8fe9

    SHA256

    4aa24a4137603a0fb31ed6ce24f6f372928f5df3c684faab1eb5e739728e610a

    SHA512

    16fd22a5ec5857471f6cfba5a481e9a55200d9c5900d1625fe14b6092308df6066a7e6274d4ecf1f2a28e188cded66e1ca5ee0c323edfcc1033d6c9186fa43c3

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\UninstallDisable.doc.exe

    Filesize

    256KB

    MD5

    43b4be4a7335d28ff35355823d912dcd

    SHA1

    82413257675b6cad2cc2d3d2301d7be7186fd1ee

    SHA256

    5233209e322a4a1ef70d6f61b4d853773bfb4e57959292465a4abff17f3fece6

    SHA512

    d03649ecb451c4acf1a050b5c9a087853ec0f13b7d762230af37b7fb0526985715d3b9cfdf8581f06b065e8abe28902ee570baaddb179409ad51e02259ae664a

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    256KB

    MD5

    0c09e5412314e4a33bdbe36ad427a647

    SHA1

    c97443880d53a4c746eac314b2adc1cd694271ca

    SHA256

    10b9e34818073e79544e6a75e22308afe4465b963f8a972190b14bcc855d934c

    SHA512

    f9249242bcd29175a1715cbb5374a70aa6bc072beb89febf86cdde72a169d0642c6d46158c99273511a9dc0c2eebe2f7cd635223a6ef02721dd8e628e28d9f19

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    256KB

    MD5

    9964ed521c955ac5ceeefd3e276812f4

    SHA1

    43f37f4f0ca8e30b1098e5274aac8d9e22e19036

    SHA256

    9e65fca40598fc4eca96f8fed853c2494517be915c1b8fc1823b99d3b6726dfe

    SHA512

    db74d6f08b5830f804e1bbcac5967f271e11ddb5a7f1051040a93167073d90f3a05f506cd4cb80834cc5136116fe81abfa64208f057b9669debf526f12ebc97a

  • memory/628-166-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/628-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/740-165-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/740-176-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/740-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2200-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2200-164-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3116-155-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-172-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-157-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-158-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-159-0x00007FF818AE0000-0x00007FF818AF0000-memory.dmp

    Filesize

    64KB

  • memory/3116-160-0x00007FF818AE0000-0x00007FF818AF0000-memory.dmp

    Filesize

    64KB

  • memory/3116-174-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-173-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-154-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-156-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3116-171-0x00007FF81AE90000-0x00007FF81AEA0000-memory.dmp

    Filesize

    64KB

  • memory/4312-167-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4312-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4312-175-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4492-163-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4492-145-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4708-150-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB