Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    174s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 21:00

General

  • Target

    00b47253a1baf315635cb8e7448f5d8ea2e005d6efffef27bf27387ad634f0cb.exe

  • Size

    255KB

  • MD5

    a1595753bc6f4516c9c765cbcd0e17f0

  • SHA1

    af542b64ac2b60a7f14e1f8595b8125491ccd21d

  • SHA256

    00b47253a1baf315635cb8e7448f5d8ea2e005d6efffef27bf27387ad634f0cb

  • SHA512

    55fb0d4ce6150ce04c812fcc2b2136893f481a1e8bc5343efd730de7d72a821e87212a8afb07e417d6c98fd02d631db5e316f466d9dfad96024e7ed7cc95bae3

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJO:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIn

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00b47253a1baf315635cb8e7448f5d8ea2e005d6efffef27bf27387ad634f0cb.exe
    "C:\Users\Admin\AppData\Local\Temp\00b47253a1baf315635cb8e7448f5d8ea2e005d6efffef27bf27387ad634f0cb.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\SysWOW64\quhorfviqvsjnld.exe
      quhorfviqvsjnld.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4924
    • C:\Windows\SysWOW64\aqhokphc.exe
      aqhokphc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4800
    • C:\Windows\SysWOW64\zanpvtyxrmlxa.exe
      zanpvtyxrmlxa.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4776
    • C:\Windows\SysWOW64\buxignwtye.exe
      buxignwtye.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5080
      • C:\Windows\SysWOW64\aqhokphc.exe
        C:\Windows\system32\aqhokphc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5048
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    e1d0868b909af956be3c2cf3e6e1e1e6

    SHA1

    5094d2cec23a9d676275a6e47f5c395d906b947f

    SHA256

    f2e9c1cde3676123818ffcd1d3936354f8e08831b2da76be3f520a119a3ec125

    SHA512

    df69bf71955558c9195c94903f99a994c6b64afb1bfe2032b51df5abe3ff98e80ca565d2425f69fe48a2458e3a8a2c517b6aeab408e29f874739e451ceb4287c

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    8284982697c02350938db2770a6d1e36

    SHA1

    9dd315487fb49eff0a5d492873d5966ffc535670

    SHA256

    d08a58e28d32b85c3983d8a6eb27a2f9dc0221702d86e916414d5fa5159717f0

    SHA512

    75c706038eceadf086fbfcd4bb4c402d70cceda2f137b950cc1e02327ac9ea316914a0479d1e7c7073500cffb127ccff0fad7c0b5b5d00d31f3b105fd18411e8

  • C:\Windows\SysWOW64\aqhokphc.exe

    Filesize

    255KB

    MD5

    158418e66d57b245db88ae4b60072732

    SHA1

    138f3f07fd2d81c645a418bde861fc815f77213c

    SHA256

    47c6d4572f6c7391f07687adef47e86dc1b21a2dcfe634acd8a8d2cd4d6f64b2

    SHA512

    7dc65037432a0441f48fe3c5e99739f1ef71d84d8dc0d92383bbaa5ace965a1637ab7137d9d7020dd342fc758550b74dbab74501b5493d42713a07b7e66c4734

  • C:\Windows\SysWOW64\aqhokphc.exe

    Filesize

    255KB

    MD5

    158418e66d57b245db88ae4b60072732

    SHA1

    138f3f07fd2d81c645a418bde861fc815f77213c

    SHA256

    47c6d4572f6c7391f07687adef47e86dc1b21a2dcfe634acd8a8d2cd4d6f64b2

    SHA512

    7dc65037432a0441f48fe3c5e99739f1ef71d84d8dc0d92383bbaa5ace965a1637ab7137d9d7020dd342fc758550b74dbab74501b5493d42713a07b7e66c4734

  • C:\Windows\SysWOW64\aqhokphc.exe

    Filesize

    255KB

    MD5

    158418e66d57b245db88ae4b60072732

    SHA1

    138f3f07fd2d81c645a418bde861fc815f77213c

    SHA256

    47c6d4572f6c7391f07687adef47e86dc1b21a2dcfe634acd8a8d2cd4d6f64b2

    SHA512

    7dc65037432a0441f48fe3c5e99739f1ef71d84d8dc0d92383bbaa5ace965a1637ab7137d9d7020dd342fc758550b74dbab74501b5493d42713a07b7e66c4734

  • C:\Windows\SysWOW64\buxignwtye.exe

    Filesize

    255KB

    MD5

    308d24fcbb0040a065fda308d2413b39

    SHA1

    3a6131d3eae3824c296553cc29fc8bb42a70802a

    SHA256

    544f9ab538a75fbdf77bb84843a8264b1b361828e1c3b664e87b5bd6bab95bf9

    SHA512

    db7b2b5ec098276957aebbec4191a602ceac577b8ac83bad61c9ee0099704d6dcad7d984873dcc406624c75ded0e6cc09a679c221ec57027df8e969e1933f8b9

  • C:\Windows\SysWOW64\buxignwtye.exe

    Filesize

    255KB

    MD5

    308d24fcbb0040a065fda308d2413b39

    SHA1

    3a6131d3eae3824c296553cc29fc8bb42a70802a

    SHA256

    544f9ab538a75fbdf77bb84843a8264b1b361828e1c3b664e87b5bd6bab95bf9

    SHA512

    db7b2b5ec098276957aebbec4191a602ceac577b8ac83bad61c9ee0099704d6dcad7d984873dcc406624c75ded0e6cc09a679c221ec57027df8e969e1933f8b9

  • C:\Windows\SysWOW64\quhorfviqvsjnld.exe

    Filesize

    255KB

    MD5

    4967ef26c7e0f952e4d190163a37b74e

    SHA1

    cb6f378ea120ee841cad100b4f6d9685d0269763

    SHA256

    e193a71c66798053e01a5b046bd4ce0b2e09b2251f3a4cc6aa1d84680e513b53

    SHA512

    336e48998038b4d1ae63aee12c3bb2e4a431e7e339cd3898148a2ee92e5ffa422c5ded1224c02f9d2c00df2068e1f89881f9d0d2422b71a67de31ecbb3ab685c

  • C:\Windows\SysWOW64\quhorfviqvsjnld.exe

    Filesize

    255KB

    MD5

    4967ef26c7e0f952e4d190163a37b74e

    SHA1

    cb6f378ea120ee841cad100b4f6d9685d0269763

    SHA256

    e193a71c66798053e01a5b046bd4ce0b2e09b2251f3a4cc6aa1d84680e513b53

    SHA512

    336e48998038b4d1ae63aee12c3bb2e4a431e7e339cd3898148a2ee92e5ffa422c5ded1224c02f9d2c00df2068e1f89881f9d0d2422b71a67de31ecbb3ab685c

  • C:\Windows\SysWOW64\zanpvtyxrmlxa.exe

    Filesize

    255KB

    MD5

    b95a0b428e815408cb9ac40a47ba0914

    SHA1

    f5e675eb0554d4ef92cb40326a0a6be321505f4c

    SHA256

    81f90f5f8717c30d9b8d5a7365886896982adfa94ad180790b4a7c8b5613976b

    SHA512

    a13c25223f48be2f28957d5567f18ddad155ff805ab63210632055b8736439ff65d530a1f5184c892f3d59e990bd86a2f7f1f73385e357a123dc61bb4db35ef8

  • C:\Windows\SysWOW64\zanpvtyxrmlxa.exe

    Filesize

    255KB

    MD5

    b95a0b428e815408cb9ac40a47ba0914

    SHA1

    f5e675eb0554d4ef92cb40326a0a6be321505f4c

    SHA256

    81f90f5f8717c30d9b8d5a7365886896982adfa94ad180790b4a7c8b5613976b

    SHA512

    a13c25223f48be2f28957d5567f18ddad155ff805ab63210632055b8736439ff65d530a1f5184c892f3d59e990bd86a2f7f1f73385e357a123dc61bb4db35ef8

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/1960-162-0x00007FFC42D80000-0x00007FFC42D90000-memory.dmp

    Filesize

    64KB

  • memory/1960-156-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-173-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-172-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-171-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-170-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-161-0x00007FFC42D80000-0x00007FFC42D90000-memory.dmp

    Filesize

    64KB

  • memory/1960-160-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-159-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-158-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/1960-157-0x00007FFC45150000-0x00007FFC45160000-memory.dmp

    Filesize

    64KB

  • memory/4032-152-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4032-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4776-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4776-166-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4800-165-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4800-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4924-164-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4924-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5048-167-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5048-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5080-163-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5080-145-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB