Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    247s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 01:29

General

  • Target

    b6fcadf613fe44061ed7efacc5b59481691cd3df655413c357c8158f04c67d40.exe

  • Size

    255KB

  • MD5

    35d74058be934983af3656837f6adbfe

  • SHA1

    1bcf4106549d0ceb37fd4024d286223e53582f6a

  • SHA256

    b6fcadf613fe44061ed7efacc5b59481691cd3df655413c357c8158f04c67d40

  • SHA512

    2e8dcfa350be532c3f2c45cfb5313db2ce5165fe8271254347607b55e5ec6d6516841356ea9a2db09a263292a516e286182af0269bd9581024e9325c8062042b

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJW:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIj

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6fcadf613fe44061ed7efacc5b59481691cd3df655413c357c8158f04c67d40.exe
    "C:\Users\Admin\AppData\Local\Temp\b6fcadf613fe44061ed7efacc5b59481691cd3df655413c357c8158f04c67d40.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\SysWOW64\pmtgpemnpg.exe
      pmtgpemnpg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\SysWOW64\aitupmki.exe
        C:\Windows\system32\aitupmki.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:672
    • C:\Windows\SysWOW64\ducvqmghwkdxdgm.exe
      ducvqmghwkdxdgm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1556
    • C:\Windows\SysWOW64\aitupmki.exe
      aitupmki.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:820
    • C:\Windows\SysWOW64\zwsrlpvvjcdqj.exe
      zwsrlpvvjcdqj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:868
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:864
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1620
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x588
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1472

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\UninstallClear.doc.exe

      Filesize

      255KB

      MD5

      9c6c3c0b807e1e0620f5f35e8633ef03

      SHA1

      0cd6bb1eaa9b185b7e98597d2fad4d9a373e5fc3

      SHA256

      89201d088166dab4fcca66832c3f5193eab7a44ff6cb33101c2c5116267c852a

      SHA512

      75c16e967352fe740383c452f1106c80e3a8b60ddf2b9180885d86e17f31598276ddca35c4a41a23f05e483790444e1e4ccd0438c82698608108e1701a619f9d

    • C:\Windows\SysWOW64\aitupmki.exe

      Filesize

      255KB

      MD5

      d24fccb0b90cec1b6e1427f3c15b15ed

      SHA1

      4f15466dd90deadb3e9efdfed896c60177298c31

      SHA256

      663f49faee2a8a0937a0d780a9194953139d822c7e08f9d737ede0e639ca50c8

      SHA512

      1fc80c36f8b2612070d6e488db57cba28589afa9a68bc517cf41044df2fdb5712a0191efec285e72fdd29985aeff0f992d7069a093c7b3d197100a43e016ec04

    • C:\Windows\SysWOW64\aitupmki.exe

      Filesize

      255KB

      MD5

      d24fccb0b90cec1b6e1427f3c15b15ed

      SHA1

      4f15466dd90deadb3e9efdfed896c60177298c31

      SHA256

      663f49faee2a8a0937a0d780a9194953139d822c7e08f9d737ede0e639ca50c8

      SHA512

      1fc80c36f8b2612070d6e488db57cba28589afa9a68bc517cf41044df2fdb5712a0191efec285e72fdd29985aeff0f992d7069a093c7b3d197100a43e016ec04

    • C:\Windows\SysWOW64\aitupmki.exe

      Filesize

      255KB

      MD5

      d24fccb0b90cec1b6e1427f3c15b15ed

      SHA1

      4f15466dd90deadb3e9efdfed896c60177298c31

      SHA256

      663f49faee2a8a0937a0d780a9194953139d822c7e08f9d737ede0e639ca50c8

      SHA512

      1fc80c36f8b2612070d6e488db57cba28589afa9a68bc517cf41044df2fdb5712a0191efec285e72fdd29985aeff0f992d7069a093c7b3d197100a43e016ec04

    • C:\Windows\SysWOW64\ducvqmghwkdxdgm.exe

      Filesize

      255KB

      MD5

      633049bca29430bd97e0523c53093e66

      SHA1

      239ca8fe487d6b6750d69b18816bf4f13d618da8

      SHA256

      d1130bada50992e7f492a3c0166bc375cbbfbc5336066b0f70fb7e7c76b02f83

      SHA512

      67e357538a1e69018b8c32460966ecbb6687f892dcc2d77118613d3e26a963aca9c34164a022b1dd46da3bade34429b5b31704d415c7e0eb9ef25cb1e9d106ee

    • C:\Windows\SysWOW64\ducvqmghwkdxdgm.exe

      Filesize

      255KB

      MD5

      633049bca29430bd97e0523c53093e66

      SHA1

      239ca8fe487d6b6750d69b18816bf4f13d618da8

      SHA256

      d1130bada50992e7f492a3c0166bc375cbbfbc5336066b0f70fb7e7c76b02f83

      SHA512

      67e357538a1e69018b8c32460966ecbb6687f892dcc2d77118613d3e26a963aca9c34164a022b1dd46da3bade34429b5b31704d415c7e0eb9ef25cb1e9d106ee

    • C:\Windows\SysWOW64\pmtgpemnpg.exe

      Filesize

      255KB

      MD5

      8326efd4ed58462cb20fd36109c24d94

      SHA1

      738905134632f3efa7a37f0515cea2148f1314a5

      SHA256

      3409db81c29dea29c568c9ae637b97e1dca238f58137c6bfb20abd882f079db3

      SHA512

      ea57dcb0a30499408fb1da40f96e8a9622bd7bf2a5e1dc591525fab0734fd22b4d6dc1725e7c27e8c1b151bf2b1a323337d6a104d686d50a6da9daebdc1c4634

    • C:\Windows\SysWOW64\pmtgpemnpg.exe

      Filesize

      255KB

      MD5

      8326efd4ed58462cb20fd36109c24d94

      SHA1

      738905134632f3efa7a37f0515cea2148f1314a5

      SHA256

      3409db81c29dea29c568c9ae637b97e1dca238f58137c6bfb20abd882f079db3

      SHA512

      ea57dcb0a30499408fb1da40f96e8a9622bd7bf2a5e1dc591525fab0734fd22b4d6dc1725e7c27e8c1b151bf2b1a323337d6a104d686d50a6da9daebdc1c4634

    • C:\Windows\SysWOW64\zwsrlpvvjcdqj.exe

      Filesize

      255KB

      MD5

      99557dd0286c720f347197565863f1ee

      SHA1

      31f01d45aa6b63a9f2b19ecef60043e532dfa717

      SHA256

      acf0a5e02f66048019dbf2dcfed73c026eda91c6ffd9fd27285d72abafd849f0

      SHA512

      e730ec040bbd462a12ae45b78b304885767728e13600e26f896c2774b0600bcf86e8d11106534051147137d4c96d151c4d57a62fe84d227d790be040268058fa

    • C:\Windows\SysWOW64\zwsrlpvvjcdqj.exe

      Filesize

      255KB

      MD5

      99557dd0286c720f347197565863f1ee

      SHA1

      31f01d45aa6b63a9f2b19ecef60043e532dfa717

      SHA256

      acf0a5e02f66048019dbf2dcfed73c026eda91c6ffd9fd27285d72abafd849f0

      SHA512

      e730ec040bbd462a12ae45b78b304885767728e13600e26f896c2774b0600bcf86e8d11106534051147137d4c96d151c4d57a62fe84d227d790be040268058fa

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\aitupmki.exe

      Filesize

      255KB

      MD5

      d24fccb0b90cec1b6e1427f3c15b15ed

      SHA1

      4f15466dd90deadb3e9efdfed896c60177298c31

      SHA256

      663f49faee2a8a0937a0d780a9194953139d822c7e08f9d737ede0e639ca50c8

      SHA512

      1fc80c36f8b2612070d6e488db57cba28589afa9a68bc517cf41044df2fdb5712a0191efec285e72fdd29985aeff0f992d7069a093c7b3d197100a43e016ec04

    • \Windows\SysWOW64\aitupmki.exe

      Filesize

      255KB

      MD5

      d24fccb0b90cec1b6e1427f3c15b15ed

      SHA1

      4f15466dd90deadb3e9efdfed896c60177298c31

      SHA256

      663f49faee2a8a0937a0d780a9194953139d822c7e08f9d737ede0e639ca50c8

      SHA512

      1fc80c36f8b2612070d6e488db57cba28589afa9a68bc517cf41044df2fdb5712a0191efec285e72fdd29985aeff0f992d7069a093c7b3d197100a43e016ec04

    • \Windows\SysWOW64\ducvqmghwkdxdgm.exe

      Filesize

      255KB

      MD5

      633049bca29430bd97e0523c53093e66

      SHA1

      239ca8fe487d6b6750d69b18816bf4f13d618da8

      SHA256

      d1130bada50992e7f492a3c0166bc375cbbfbc5336066b0f70fb7e7c76b02f83

      SHA512

      67e357538a1e69018b8c32460966ecbb6687f892dcc2d77118613d3e26a963aca9c34164a022b1dd46da3bade34429b5b31704d415c7e0eb9ef25cb1e9d106ee

    • \Windows\SysWOW64\pmtgpemnpg.exe

      Filesize

      255KB

      MD5

      8326efd4ed58462cb20fd36109c24d94

      SHA1

      738905134632f3efa7a37f0515cea2148f1314a5

      SHA256

      3409db81c29dea29c568c9ae637b97e1dca238f58137c6bfb20abd882f079db3

      SHA512

      ea57dcb0a30499408fb1da40f96e8a9622bd7bf2a5e1dc591525fab0734fd22b4d6dc1725e7c27e8c1b151bf2b1a323337d6a104d686d50a6da9daebdc1c4634

    • \Windows\SysWOW64\zwsrlpvvjcdqj.exe

      Filesize

      255KB

      MD5

      99557dd0286c720f347197565863f1ee

      SHA1

      31f01d45aa6b63a9f2b19ecef60043e532dfa717

      SHA256

      acf0a5e02f66048019dbf2dcfed73c026eda91c6ffd9fd27285d72abafd849f0

      SHA512

      e730ec040bbd462a12ae45b78b304885767728e13600e26f896c2774b0600bcf86e8d11106534051147137d4c96d151c4d57a62fe84d227d790be040268058fa

    • memory/656-79-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/656-54-0x00000000767C1000-0x00000000767C3000-memory.dmp

      Filesize

      8KB

    • memory/656-56-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/656-57-0x0000000002100000-0x00000000021A0000-memory.dmp

      Filesize

      640KB

    • memory/656-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/672-88-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/672-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/820-74-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/820-97-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/868-78-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/868-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1556-75-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1556-98-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1620-86-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmp

      Filesize

      8KB

    • memory/1828-93-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1828-92-0x0000000070501000-0x0000000070503000-memory.dmp

      Filesize

      8KB

    • memory/1828-91-0x0000000072A81000-0x0000000072A84000-memory.dmp

      Filesize

      12KB

    • memory/1828-99-0x00000000714ED000-0x00000000714F8000-memory.dmp

      Filesize

      44KB

    • memory/1828-102-0x00000000714ED000-0x00000000714F8000-memory.dmp

      Filesize

      44KB

    • memory/1864-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1864-73-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1864-87-0x0000000003C80000-0x0000000003D20000-memory.dmp

      Filesize

      640KB