Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    44s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 04:29

General

  • Target

    6c222f6429e297f517eed9bc737a19e8eec08a3c840d70441c47836923b3761c.exe

  • Size

    52KB

  • MD5

    38fad30c6ee239246741b4991d8d1720

  • SHA1

    b2da0d90a56e3ce0508d34b882c6937e230e3edc

  • SHA256

    6c222f6429e297f517eed9bc737a19e8eec08a3c840d70441c47836923b3761c

  • SHA512

    5401f6acb1a41a97cd0561fba8916650df2ad4ec9491323870a6642bf41717ed7365ea0313b1b93273a1eaf6e13bb0402b525f723f761abf2a5db66d20d7f710

  • SSDEEP

    768:EclW/lMFggAKwU0DN1C0wlfAenhODYaG426VmkblAYG3iqKMP65PuMPI2hTTToT:tWN/gAKqfCmQhOp2Yb9wbPCP5QqTToT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c222f6429e297f517eed9bc737a19e8eec08a3c840d70441c47836923b3761c.exe
    "C:\Users\Admin\AppData\Local\Temp\6c222f6429e297f517eed9bc737a19e8eec08a3c840d70441c47836923b3761c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\zk\indexOlds.vbe" 0
      2⤵
        PID:300
      • C:\Windows\wgzm\smss.exe
        C:\Windows\wgzm\smss.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1300
        • C:\Windows\SysWOW64\reg.exe
          reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v "baidu" /d "c:\windows\wgzm\smss.exe " /f
          3⤵
            PID:692
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s "C:\Program Files\jqhwa\bajfv.dll"
          2⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:1932
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c regedit.exe /s C:\Windows\reg.reg
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Windows\SysWOW64\regedit.exe
            regedit.exe /s C:\Windows\reg.reg
            3⤵
            • Installs/modifies Browser Helper Object
            • Runs .reg file with regedit
            PID:632
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c regedit.exe /s C:\Windows\WindowsMy.reg
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Windows\SysWOW64\regedit.exe
            regedit.exe /s C:\Windows\WindowsMy.reg
            3⤵
            • Modifies registry class
            • Runs .reg file with regedit
            PID:1544
        • C:\Windows\SysWOW64\WScript.Exe
          WScript.Exe C:\Windows\del.tmp.bho.bho.bho.vbs
          2⤵
          • Deletes itself
          PID:2000

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\jqhwa\bajfv.dll

        Filesize

        28KB

        MD5

        3828594d73900c5c5358e17e28ac21b1

        SHA1

        df78ecd976d828c53332184df37cd8876dbed1a2

        SHA256

        d038403782ece2e16cd79f8f4a33df35558ce23a885d126094a377b4c94d8925

        SHA512

        5858691cbf5e7ca95687bed6e75afa65d55ec18e193528a7b997febbba0a8038cde0036ec45447bc02bff4fce8988cea11ef9f9ef759c84e82f5d9af02db5499

      • C:\Windows\WindowsMy.reg

        Filesize

        1KB

        MD5

        958217370aa43a176700027f14d8620d

        SHA1

        301edce9b46a9b6d67378b83ef4c98c280c32e3e

        SHA256

        d0f35efe4fda41b828ecfb10b17673d2b2a972476dea85204e45a4b9edda055f

        SHA512

        283048c76f0b2eabcc69764dde29c75228f65630feb65df27379153b454dbf240dee2f967cb722904b3b570ea5d5570096d5320745522b4ccff86e6cc2dad5a8

      • C:\Windows\del.tmp.bho.bho.bho.vbs

        Filesize

        474B

        MD5

        49083dbce7187c5336d66b27117c2d50

        SHA1

        4c80cbf0199569526058280b8de371077676e3fe

        SHA256

        54bc23c50fdd5f6096cd8199f8ced0caad7c4cf8b09a0e201f8961dcb75255a8

        SHA512

        d750fbb708a8f72000d553aba01d444ce002cda9fdbed426c54ee6ce4a37863a2992af23df073d704fa253709ac9279880faacb401564b0e059ab1ec5a3cddcc

      • C:\Windows\reg.reg

        Filesize

        185B

        MD5

        e306a0be95a54a6455e7ed15466d5d81

        SHA1

        6cb2f94dee7cf4fefcf3b80f311e70fed747e2fd

        SHA256

        685f6bbe7c8e99402adaf80dcde15110320d49ddf9c4c5d457a6a5601381b7a2

        SHA512

        35c36e4f01803d4831939fbeae3566b9e58bf499bfe620a639b11da22b9892d7fa2db65f1cba6a7ffbc2f7aec296f9f74767e96c6585cadf5e347d0613dd23d5

      • C:\Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • C:\Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • C:\Windows\zk\indexOlds.vbe

        Filesize

        231KB

        MD5

        6cf3da30191169075dcd42c7739c7c9e

        SHA1

        fad354fafd6b66364cd60f4917ba11d89f95594f

        SHA256

        a81bf85a4baaffb3d073e3fc9d7ed9f792f0f99f3c0d1527fd1fda587d50293a

        SHA512

        fc04c91b0dc5cdf43ca968b64c6cf748761685a1d34dbde7e5b4712d56f4ef16ec761c4edd27e820398957036dfd398c2de006b08d6b14778e8a1758d846383e

      • \Program Files\jqhwa\bajfv.dll

        Filesize

        28KB

        MD5

        3828594d73900c5c5358e17e28ac21b1

        SHA1

        df78ecd976d828c53332184df37cd8876dbed1a2

        SHA256

        d038403782ece2e16cd79f8f4a33df35558ce23a885d126094a377b4c94d8925

        SHA512

        5858691cbf5e7ca95687bed6e75afa65d55ec18e193528a7b997febbba0a8038cde0036ec45447bc02bff4fce8988cea11ef9f9ef759c84e82f5d9af02db5499

      • \Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • \Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • \Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • \Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • \Windows\wgzm\smss.exe

        Filesize

        64KB

        MD5

        cbac52bb2b9e20b24ef7c47d7e9a4fa4

        SHA1

        17f20b8a479167e988a1a71ff05e9caf09a5ffc8

        SHA256

        390b9fd28632280fd79a5e3f19b86cfe6634d90ede18e9e7aeef9d748f4683fa

        SHA512

        d36305aa1ae3c04e9618ee4d82a89759d6f633cba17b29dc9b600464adc04e6cd8afa980bd663aed5291175001be82fb336bba68c344144f6d03bec75597f9b5

      • memory/864-57-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/864-58-0x0000000000230000-0x0000000000269000-memory.dmp

        Filesize

        228KB

      • memory/864-54-0x0000000076321000-0x0000000076323000-memory.dmp

        Filesize

        8KB

      • memory/864-86-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/864-87-0x0000000000230000-0x000000000023D000-memory.dmp

        Filesize

        52KB