Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    158s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 16:08

General

  • Target

    23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe

  • Size

    255KB

  • MD5

    06aa52d3519cbceda0513bf78c4b83f0

  • SHA1

    3fdae2728658cf9fb066cb5ede05685936f38892

  • SHA256

    23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8

  • SHA512

    75356f9627fbbd6c530bc5b5dfa384df87ba25b94ba0a81beb7a5a6ea1d1d2a0294911e2a943fdd2e3d33401b6e81a197f315dbde67c61fa797129653e2bbfa9

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/4:Plf5j6zCNa0xeE3mI

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe
    "C:\Users\Admin\AppData\Local\Temp\23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Windows\SysWOW64\dqcknbomgy.exe
      dqcknbomgy.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Windows\SysWOW64\ufmnshpk.exe
        C:\Windows\system32\ufmnshpk.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:224
    • C:\Windows\SysWOW64\dckzpvyntdxbgju.exe
      dckzpvyntdxbgju.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c btiomosmhekfi.exe
        3⤵
          PID:2348
      • C:\Windows\SysWOW64\ufmnshpk.exe
        ufmnshpk.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4844
      • C:\Windows\SysWOW64\btiomosmhekfi.exe
        btiomosmhekfi.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1784
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4452

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      6a37c4f03fe4ead4ae900f79e6991c73

      SHA1

      6c1706ed697739a22bf9f275ef67ca1d4609da9d

      SHA256

      7b705534c2fe3617674fea24b1082085ea502d0c4164fa2cee221d01fea43416

      SHA512

      0ceb4031acd419290050de2bd0654b9404397d302fcd8ec6c11fc1d7d42644d1e1a8c6ead160f4080f1049f4511c9413a4e2274e330d4364d96a2acbd85289f1

    • C:\Windows\SysWOW64\btiomosmhekfi.exe

      Filesize

      255KB

      MD5

      aa9aa482dfa173c8b6a11990151818a7

      SHA1

      19903cab78cee566175dfb3ee9e92c2e94e38272

      SHA256

      605c8867f37ce432fcb617f113891de3f3b441924584e49ca303c1c177fb1398

      SHA512

      002fe26c1dcbd592d007c5296286aeaa40209707c282d5ff18bc6b4043ac0d2ec55b3f0f806fd3a57aaa158bd770fef055eb9b3a64707dc10041af507657985c

    • C:\Windows\SysWOW64\btiomosmhekfi.exe

      Filesize

      255KB

      MD5

      aa9aa482dfa173c8b6a11990151818a7

      SHA1

      19903cab78cee566175dfb3ee9e92c2e94e38272

      SHA256

      605c8867f37ce432fcb617f113891de3f3b441924584e49ca303c1c177fb1398

      SHA512

      002fe26c1dcbd592d007c5296286aeaa40209707c282d5ff18bc6b4043ac0d2ec55b3f0f806fd3a57aaa158bd770fef055eb9b3a64707dc10041af507657985c

    • C:\Windows\SysWOW64\dckzpvyntdxbgju.exe

      Filesize

      255KB

      MD5

      593413356aeeac86c25154003a895710

      SHA1

      ef02bf3cc0e01d65b7260d215551975652fcd1f8

      SHA256

      c29c43ed4edae79bcc09fbe99551444d1b9532b1de95e031e71b0cb0ebbfa054

      SHA512

      2a0d36795df0807140406850ea9b6b1e3de2b4dc793ad0c2a9ad2795cbb55c94e81341d84a880ac21ccdb55e71006106d0c2660bdbc461a8b9f8cf9c44f62a8f

    • C:\Windows\SysWOW64\dckzpvyntdxbgju.exe

      Filesize

      255KB

      MD5

      593413356aeeac86c25154003a895710

      SHA1

      ef02bf3cc0e01d65b7260d215551975652fcd1f8

      SHA256

      c29c43ed4edae79bcc09fbe99551444d1b9532b1de95e031e71b0cb0ebbfa054

      SHA512

      2a0d36795df0807140406850ea9b6b1e3de2b4dc793ad0c2a9ad2795cbb55c94e81341d84a880ac21ccdb55e71006106d0c2660bdbc461a8b9f8cf9c44f62a8f

    • C:\Windows\SysWOW64\dqcknbomgy.exe

      Filesize

      255KB

      MD5

      0e262e058015d45e0d86805d590018f5

      SHA1

      430759cb5dc64f50ff7d07474c1079f16b288c95

      SHA256

      543dbcb17eafd88b83c021136f62c48ecbe271f3678e5b8e084279c01b1be82b

      SHA512

      31bcaf0cc916ec4ec6e00e758c533fe78b61d4e1c9a53c63cf074cb8af8ce768accce662f05e9475bfaf7365c7f16e11ccbb7bc6d420c58b3a54d3c7a1d13397

    • C:\Windows\SysWOW64\dqcknbomgy.exe

      Filesize

      255KB

      MD5

      0e262e058015d45e0d86805d590018f5

      SHA1

      430759cb5dc64f50ff7d07474c1079f16b288c95

      SHA256

      543dbcb17eafd88b83c021136f62c48ecbe271f3678e5b8e084279c01b1be82b

      SHA512

      31bcaf0cc916ec4ec6e00e758c533fe78b61d4e1c9a53c63cf074cb8af8ce768accce662f05e9475bfaf7365c7f16e11ccbb7bc6d420c58b3a54d3c7a1d13397

    • C:\Windows\SysWOW64\ufmnshpk.exe

      Filesize

      255KB

      MD5

      d27b3fb583639bcd89c6049300e37f9e

      SHA1

      908d69a80fdc2ea40d5edd3836f36d036794bc92

      SHA256

      49a5a3cc86917999fdadb767a5d002c6a3754f4ab0035c4360902c1e6779c703

      SHA512

      8da7d095896a7e13a6c53b6e54ba8b71d4aecbcbf5923901db4ed16f2476c28997c35e6d32e147ed2def76e2888e8869427b0734b268a65f1524375221457a3a

    • C:\Windows\SysWOW64\ufmnshpk.exe

      Filesize

      255KB

      MD5

      d27b3fb583639bcd89c6049300e37f9e

      SHA1

      908d69a80fdc2ea40d5edd3836f36d036794bc92

      SHA256

      49a5a3cc86917999fdadb767a5d002c6a3754f4ab0035c4360902c1e6779c703

      SHA512

      8da7d095896a7e13a6c53b6e54ba8b71d4aecbcbf5923901db4ed16f2476c28997c35e6d32e147ed2def76e2888e8869427b0734b268a65f1524375221457a3a

    • C:\Windows\SysWOW64\ufmnshpk.exe

      Filesize

      255KB

      MD5

      d27b3fb583639bcd89c6049300e37f9e

      SHA1

      908d69a80fdc2ea40d5edd3836f36d036794bc92

      SHA256

      49a5a3cc86917999fdadb767a5d002c6a3754f4ab0035c4360902c1e6779c703

      SHA512

      8da7d095896a7e13a6c53b6e54ba8b71d4aecbcbf5923901db4ed16f2476c28997c35e6d32e147ed2def76e2888e8869427b0734b268a65f1524375221457a3a

    • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      83c5f81494a5a564ef997c876a0f63d1

      SHA1

      f63f68612ade39ce85c50fd4816bed03df54ae29

      SHA256

      95483133c8066996e98309b863543e23dd805fbcc59d9e605cb1ceedc7a307ed

      SHA512

      a53137fdc395f887fc82bb67604f126f321003be631bc4d6ed54f972058d733c1983cc40cb71f27e8e633e518cabe963c4a2a9348d912a5672093aaec28c44ab

    • memory/224-157-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/224-152-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1384-140-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1384-153-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1784-156-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2616-154-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2616-141-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4452-163-0x00007FFAC2970000-0x00007FFAC2980000-memory.dmp

      Filesize

      64KB

    • memory/4452-168-0x00007FFAC0240000-0x00007FFAC0250000-memory.dmp

      Filesize

      64KB

    • memory/4452-167-0x00007FFAC0240000-0x00007FFAC0250000-memory.dmp

      Filesize

      64KB

    • memory/4452-166-0x00007FFAC2970000-0x00007FFAC2980000-memory.dmp

      Filesize

      64KB

    • memory/4452-165-0x00007FFAC2970000-0x00007FFAC2980000-memory.dmp

      Filesize

      64KB

    • memory/4452-164-0x00007FFAC2970000-0x00007FFAC2980000-memory.dmp

      Filesize

      64KB

    • memory/4452-162-0x00007FFAC2970000-0x00007FFAC2980000-memory.dmp

      Filesize

      64KB

    • memory/4772-133-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4772-159-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4772-132-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4844-148-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4844-155-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB