Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    207s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 16:11

General

  • Target

    0a3d61ed84c5209a6c9996b3a46257ab2cd1400fb39982dc87727732df9280a3.exe

  • Size

    255KB

  • MD5

    1aa4d12e684f098a188520250ac71f4e

  • SHA1

    8d427ee12d9bd0db77f0acce2637cc715d440e8c

  • SHA256

    0a3d61ed84c5209a6c9996b3a46257ab2cd1400fb39982dc87727732df9280a3

  • SHA512

    54a0b72df926dc38e59fe15c2d596bb25b343fc30a7718d6e863d4b5070773f9e42807e30ca50e9adb0bda4cebfe892e9aea15a6b6354302c9d20770be34a945

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJC:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI1

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a3d61ed84c5209a6c9996b3a46257ab2cd1400fb39982dc87727732df9280a3.exe
    "C:\Users\Admin\AppData\Local\Temp\0a3d61ed84c5209a6c9996b3a46257ab2cd1400fb39982dc87727732df9280a3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\swvowazkzc.exe
      swvowazkzc.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\msipakiq.exe
        C:\Windows\system32\msipakiq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1584
    • C:\Windows\SysWOW64\msipakiq.exe
      msipakiq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2020
    • C:\Windows\SysWOW64\zaqeqgcqeyfwu.exe
      zaqeqgcqeyfwu.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2004
    • C:\Windows\SysWOW64\pxfdmwnrsfdlbka.exe
      pxfdmwnrsfdlbka.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c zaqeqgcqeyfwu.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:272
        • C:\Windows\SysWOW64\zaqeqgcqeyfwu.exe
          zaqeqgcqeyfwu.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:684
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1204

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      f48bfa58a121abe6e451bc2ca313b556

      SHA1

      df078b34ee3fb1fbb7ca415c87010b154d9cedb6

      SHA256

      26a935e0fcf1b42935e86dc837dcadf984cf89a39a38816a93e9e7c2c6683370

      SHA512

      63e9f8fa526bb68e12e0b8a1668302275b765ae06a20e084c621b1722eeb59302736f9b190e5d1b84a42ec207b34c555dceb3766fc7d7635158c0facdcd76d83

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      03812da71354727281c2ff8d95a6945d

      SHA1

      e32c9a9213b8ed22ed855dd9723aa19daf0421d4

      SHA256

      264d09aa306ced47162eeaabe8d6022d76f76bd8cd504cacd78ea613a1c379d7

      SHA512

      cef1d9668b7af812df5ebedcd44500f8e1f852a270f2c1d234dbf61e223d9284b479e058fb34a94bc1abfbb08318e356566b1794e98c7162038ee4df1b4fe7a7

    • C:\Program Files\PushMount.doc.exe

      Filesize

      255KB

      MD5

      6d7dcd9456cbd20cc9d8b0eef0d8d436

      SHA1

      b8bc3c4d93d648665d939a899e4150a229b9c885

      SHA256

      2dc473b2d931f790ed86ec2eb548d061e1776947f7e422340c08969eba9bc78e

      SHA512

      543afb234bbfd1656db7a64dcddfe0a9cfa4298a2058b9f5d9dd1077a7a639408d1b2572b593339bed768560f11b7b8cff19869735c3079508c2a7d19bd3ca5f

    • C:\Windows\SysWOW64\msipakiq.exe

      Filesize

      255KB

      MD5

      d2ede1c3949a7594bdeb20c99d5f1619

      SHA1

      dc4d36837220bf0e16b72896666cb0f8a6fdb35a

      SHA256

      02ae9f6dcac297b7721c9a5fa34957561120d3a82a7aa45f0f1a139ae719a573

      SHA512

      def10bef24f5cb1cbee619aa5365672788b0c2ac4ea61d149bba9132f25a3c0b8f1e628eae186873a6d4629b41919709ee95d3b26ac71cb36820c90e0cf052be

    • C:\Windows\SysWOW64\msipakiq.exe

      Filesize

      255KB

      MD5

      d2ede1c3949a7594bdeb20c99d5f1619

      SHA1

      dc4d36837220bf0e16b72896666cb0f8a6fdb35a

      SHA256

      02ae9f6dcac297b7721c9a5fa34957561120d3a82a7aa45f0f1a139ae719a573

      SHA512

      def10bef24f5cb1cbee619aa5365672788b0c2ac4ea61d149bba9132f25a3c0b8f1e628eae186873a6d4629b41919709ee95d3b26ac71cb36820c90e0cf052be

    • C:\Windows\SysWOW64\msipakiq.exe

      Filesize

      255KB

      MD5

      d2ede1c3949a7594bdeb20c99d5f1619

      SHA1

      dc4d36837220bf0e16b72896666cb0f8a6fdb35a

      SHA256

      02ae9f6dcac297b7721c9a5fa34957561120d3a82a7aa45f0f1a139ae719a573

      SHA512

      def10bef24f5cb1cbee619aa5365672788b0c2ac4ea61d149bba9132f25a3c0b8f1e628eae186873a6d4629b41919709ee95d3b26ac71cb36820c90e0cf052be

    • C:\Windows\SysWOW64\pxfdmwnrsfdlbka.exe

      Filesize

      255KB

      MD5

      406ef3775697ce575e4da77a5b6e3d5e

      SHA1

      43e95af6271408a1956629751492e8513730cac2

      SHA256

      682c7ea59decbc7f1778ce2dc6d317e4fbbc2c8ee73f22c46fdacd46931e378b

      SHA512

      17d1d3cb6c0c9384e33484354df539bee14225ee3ca8bf6be6124401de9d6809ef28026c7a6beb6b2bb68601d69f74651b05d3a80c4d3e2cfff1ae3dff257bb8

    • C:\Windows\SysWOW64\pxfdmwnrsfdlbka.exe

      Filesize

      255KB

      MD5

      406ef3775697ce575e4da77a5b6e3d5e

      SHA1

      43e95af6271408a1956629751492e8513730cac2

      SHA256

      682c7ea59decbc7f1778ce2dc6d317e4fbbc2c8ee73f22c46fdacd46931e378b

      SHA512

      17d1d3cb6c0c9384e33484354df539bee14225ee3ca8bf6be6124401de9d6809ef28026c7a6beb6b2bb68601d69f74651b05d3a80c4d3e2cfff1ae3dff257bb8

    • C:\Windows\SysWOW64\swvowazkzc.exe

      Filesize

      255KB

      MD5

      c83bfd7164e4cd3bcbb008be47c04497

      SHA1

      e69f7a0ef1af672d1d71497a6769483401829eef

      SHA256

      a92bc92ca6614180675fb1b7a662f5bf59cfde4de92e079156276be4f02630e7

      SHA512

      c31fca6bb25f0a9b4f4479b5edf4b02b9b7f3333705895693ceb87093a849733da0ddf75c810152db874d30c94b83e32cd7d959a4a2306a107bd36a320720af9

    • C:\Windows\SysWOW64\swvowazkzc.exe

      Filesize

      255KB

      MD5

      c83bfd7164e4cd3bcbb008be47c04497

      SHA1

      e69f7a0ef1af672d1d71497a6769483401829eef

      SHA256

      a92bc92ca6614180675fb1b7a662f5bf59cfde4de92e079156276be4f02630e7

      SHA512

      c31fca6bb25f0a9b4f4479b5edf4b02b9b7f3333705895693ceb87093a849733da0ddf75c810152db874d30c94b83e32cd7d959a4a2306a107bd36a320720af9

    • C:\Windows\SysWOW64\zaqeqgcqeyfwu.exe

      Filesize

      255KB

      MD5

      f11a61e4b7bce4eae6fcf17b52e90b49

      SHA1

      056af567c6f816f215c174cf0ff6bc3d6893551c

      SHA256

      e4f36f0c45dcfa1c6b156bfc28ffeead2b2088951d43289c36cb8acece6efafc

      SHA512

      90e351d4091da4d724307ebb8a2849461ab6d099c6463280b2c32214a6549858e6b9f969b50f6b6a174f0cc0aa5f174234327d74c8e907556467e58693acabc5

    • C:\Windows\SysWOW64\zaqeqgcqeyfwu.exe

      Filesize

      255KB

      MD5

      f11a61e4b7bce4eae6fcf17b52e90b49

      SHA1

      056af567c6f816f215c174cf0ff6bc3d6893551c

      SHA256

      e4f36f0c45dcfa1c6b156bfc28ffeead2b2088951d43289c36cb8acece6efafc

      SHA512

      90e351d4091da4d724307ebb8a2849461ab6d099c6463280b2c32214a6549858e6b9f969b50f6b6a174f0cc0aa5f174234327d74c8e907556467e58693acabc5

    • C:\Windows\SysWOW64\zaqeqgcqeyfwu.exe

      Filesize

      255KB

      MD5

      f11a61e4b7bce4eae6fcf17b52e90b49

      SHA1

      056af567c6f816f215c174cf0ff6bc3d6893551c

      SHA256

      e4f36f0c45dcfa1c6b156bfc28ffeead2b2088951d43289c36cb8acece6efafc

      SHA512

      90e351d4091da4d724307ebb8a2849461ab6d099c6463280b2c32214a6549858e6b9f969b50f6b6a174f0cc0aa5f174234327d74c8e907556467e58693acabc5

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\msipakiq.exe

      Filesize

      255KB

      MD5

      d2ede1c3949a7594bdeb20c99d5f1619

      SHA1

      dc4d36837220bf0e16b72896666cb0f8a6fdb35a

      SHA256

      02ae9f6dcac297b7721c9a5fa34957561120d3a82a7aa45f0f1a139ae719a573

      SHA512

      def10bef24f5cb1cbee619aa5365672788b0c2ac4ea61d149bba9132f25a3c0b8f1e628eae186873a6d4629b41919709ee95d3b26ac71cb36820c90e0cf052be

    • \Windows\SysWOW64\msipakiq.exe

      Filesize

      255KB

      MD5

      d2ede1c3949a7594bdeb20c99d5f1619

      SHA1

      dc4d36837220bf0e16b72896666cb0f8a6fdb35a

      SHA256

      02ae9f6dcac297b7721c9a5fa34957561120d3a82a7aa45f0f1a139ae719a573

      SHA512

      def10bef24f5cb1cbee619aa5365672788b0c2ac4ea61d149bba9132f25a3c0b8f1e628eae186873a6d4629b41919709ee95d3b26ac71cb36820c90e0cf052be

    • \Windows\SysWOW64\pxfdmwnrsfdlbka.exe

      Filesize

      255KB

      MD5

      406ef3775697ce575e4da77a5b6e3d5e

      SHA1

      43e95af6271408a1956629751492e8513730cac2

      SHA256

      682c7ea59decbc7f1778ce2dc6d317e4fbbc2c8ee73f22c46fdacd46931e378b

      SHA512

      17d1d3cb6c0c9384e33484354df539bee14225ee3ca8bf6be6124401de9d6809ef28026c7a6beb6b2bb68601d69f74651b05d3a80c4d3e2cfff1ae3dff257bb8

    • \Windows\SysWOW64\swvowazkzc.exe

      Filesize

      255KB

      MD5

      c83bfd7164e4cd3bcbb008be47c04497

      SHA1

      e69f7a0ef1af672d1d71497a6769483401829eef

      SHA256

      a92bc92ca6614180675fb1b7a662f5bf59cfde4de92e079156276be4f02630e7

      SHA512

      c31fca6bb25f0a9b4f4479b5edf4b02b9b7f3333705895693ceb87093a849733da0ddf75c810152db874d30c94b83e32cd7d959a4a2306a107bd36a320720af9

    • \Windows\SysWOW64\zaqeqgcqeyfwu.exe

      Filesize

      255KB

      MD5

      f11a61e4b7bce4eae6fcf17b52e90b49

      SHA1

      056af567c6f816f215c174cf0ff6bc3d6893551c

      SHA256

      e4f36f0c45dcfa1c6b156bfc28ffeead2b2088951d43289c36cb8acece6efafc

      SHA512

      90e351d4091da4d724307ebb8a2849461ab6d099c6463280b2c32214a6549858e6b9f969b50f6b6a174f0cc0aa5f174234327d74c8e907556467e58693acabc5

    • \Windows\SysWOW64\zaqeqgcqeyfwu.exe

      Filesize

      255KB

      MD5

      f11a61e4b7bce4eae6fcf17b52e90b49

      SHA1

      056af567c6f816f215c174cf0ff6bc3d6893551c

      SHA256

      e4f36f0c45dcfa1c6b156bfc28ffeead2b2088951d43289c36cb8acece6efafc

      SHA512

      90e351d4091da4d724307ebb8a2849461ab6d099c6463280b2c32214a6549858e6b9f969b50f6b6a174f0cc0aa5f174234327d74c8e907556467e58693acabc5

    • memory/684-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/684-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1096-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1096-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1204-110-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

      Filesize

      8KB

    • memory/1308-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1308-112-0x0000000070BFD000-0x0000000070C08000-memory.dmp

      Filesize

      44KB

    • memory/1308-111-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1308-100-0x0000000070BFD000-0x0000000070C08000-memory.dmp

      Filesize

      44KB

    • memory/1308-94-0x0000000072191000-0x0000000072194000-memory.dmp

      Filesize

      12KB

    • memory/1308-95-0x000000006FC11000-0x000000006FC13000-memory.dmp

      Filesize

      8KB

    • memory/1584-106-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1584-91-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1828-54-0x0000000075601000-0x0000000075603000-memory.dmp

      Filesize

      8KB

    • memory/1828-85-0x0000000003360000-0x0000000003400000-memory.dmp

      Filesize

      640KB

    • memory/1828-93-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1828-84-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2004-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2004-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2020-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2020-88-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2024-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2024-86-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB