Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    293s
  • max time network
    341s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 01:31

General

  • Target

    9481a108b78197334b5d56aa027c4ee662159b6d20a6eb27f3bc533f52459464.exe

  • Size

    255KB

  • MD5

    97e439bd06e00539d31641727bfccba7

  • SHA1

    a597c080dc652cc2da13305853db37733ad83e10

  • SHA256

    9481a108b78197334b5d56aa027c4ee662159b6d20a6eb27f3bc533f52459464

  • SHA512

    05886a16c5601017db8de501de329511311cf0055789bb3122e530d880d8b2b3412e67bce4aab853ac78a2c28e946d22123b1cf0bc386371204afbd684391dab

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJK:1xlZam+akqx6YQJXcNlEHUIQeE3mmBID

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9481a108b78197334b5d56aa027c4ee662159b6d20a6eb27f3bc533f52459464.exe
    "C:\Users\Admin\AppData\Local\Temp\9481a108b78197334b5d56aa027c4ee662159b6d20a6eb27f3bc533f52459464.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\SysWOW64\snvmyrtdaq.exe
      snvmyrtdaq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4700
      • C:\Windows\SysWOW64\iygyyiku.exe
        C:\Windows\system32\iygyyiku.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1452
    • C:\Windows\SysWOW64\ddygxtxiufomhrz.exe
      ddygxtxiufomhrz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c nlvqrngpycnod.exe
        3⤵
          PID:3624
      • C:\Windows\SysWOW64\iygyyiku.exe
        iygyyiku.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4904
      • C:\Windows\SysWOW64\nlvqrngpycnod.exe
        nlvqrngpycnod.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4136
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
          PID:932

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\ddygxtxiufomhrz.exe

        Filesize

        255KB

        MD5

        54573ee20fe41d508ec82358b7cb2d59

        SHA1

        01bc8542dd01b04b767181f4875d11e515773407

        SHA256

        8cb4b90e8de912b86445e2f53a922d8789b51fba7b54072c829e2193ca43fb84

        SHA512

        2d5f79e4f80c55311eb48dbc608b5840c0e2da3db549fba33201e80f47cc7591e65d026f579a88052df62e6fc8f5098d5587a987a116a4e9a4a676f6c96d8172

      • C:\Windows\SysWOW64\ddygxtxiufomhrz.exe

        Filesize

        255KB

        MD5

        54573ee20fe41d508ec82358b7cb2d59

        SHA1

        01bc8542dd01b04b767181f4875d11e515773407

        SHA256

        8cb4b90e8de912b86445e2f53a922d8789b51fba7b54072c829e2193ca43fb84

        SHA512

        2d5f79e4f80c55311eb48dbc608b5840c0e2da3db549fba33201e80f47cc7591e65d026f579a88052df62e6fc8f5098d5587a987a116a4e9a4a676f6c96d8172

      • C:\Windows\SysWOW64\iygyyiku.exe

        Filesize

        255KB

        MD5

        476fd2cfa10f0fda164a239b1cbc407e

        SHA1

        38b3a26cddcce01fd47bcc792335263b2d9c2927

        SHA256

        cb1eff9b12cf0fa895634d0c798cc1c1b391777ada2842a292aebe09220d3a03

        SHA512

        aa94dda94281eb1bb82096255fe86103e7a16809bc00cd6fd69df22510252ccf93700da57e87457b20c17b1ac7db64dc2dd24bfc42251acbc831ec18ad2b39b4

      • C:\Windows\SysWOW64\iygyyiku.exe

        Filesize

        255KB

        MD5

        476fd2cfa10f0fda164a239b1cbc407e

        SHA1

        38b3a26cddcce01fd47bcc792335263b2d9c2927

        SHA256

        cb1eff9b12cf0fa895634d0c798cc1c1b391777ada2842a292aebe09220d3a03

        SHA512

        aa94dda94281eb1bb82096255fe86103e7a16809bc00cd6fd69df22510252ccf93700da57e87457b20c17b1ac7db64dc2dd24bfc42251acbc831ec18ad2b39b4

      • C:\Windows\SysWOW64\iygyyiku.exe

        Filesize

        255KB

        MD5

        476fd2cfa10f0fda164a239b1cbc407e

        SHA1

        38b3a26cddcce01fd47bcc792335263b2d9c2927

        SHA256

        cb1eff9b12cf0fa895634d0c798cc1c1b391777ada2842a292aebe09220d3a03

        SHA512

        aa94dda94281eb1bb82096255fe86103e7a16809bc00cd6fd69df22510252ccf93700da57e87457b20c17b1ac7db64dc2dd24bfc42251acbc831ec18ad2b39b4

      • C:\Windows\SysWOW64\nlvqrngpycnod.exe

        Filesize

        255KB

        MD5

        b3ec5ad0212b109f567b3a417139f4d1

        SHA1

        b370dcec27659f3e18ca36da6521de05fbf546dd

        SHA256

        dfb7e8e3db6c4204192174746fb3bca2d3e303d773460bc39abdf9b1b725435c

        SHA512

        c120a4d092b1f40caa4971bbf6a8f38416d331652b829ccd7abae1e0ac0828c72d991e22ea22c41d856d8a05189501b70f54d919cef8f469bd3775463d65bd1c

      • C:\Windows\SysWOW64\nlvqrngpycnod.exe

        Filesize

        255KB

        MD5

        b3ec5ad0212b109f567b3a417139f4d1

        SHA1

        b370dcec27659f3e18ca36da6521de05fbf546dd

        SHA256

        dfb7e8e3db6c4204192174746fb3bca2d3e303d773460bc39abdf9b1b725435c

        SHA512

        c120a4d092b1f40caa4971bbf6a8f38416d331652b829ccd7abae1e0ac0828c72d991e22ea22c41d856d8a05189501b70f54d919cef8f469bd3775463d65bd1c

      • C:\Windows\SysWOW64\snvmyrtdaq.exe

        Filesize

        255KB

        MD5

        39c0e425a3a2d0ea9b527984c45f4329

        SHA1

        1bc196766be790ee78d454aa96c05eee32da23df

        SHA256

        8ec0763d37d53e7af043ee8c38a948065d0de1ea7c2f4850b573cda674a2bcab

        SHA512

        d6e70012cc2b50786d82c9a3ddbbcb3081f5b0e195e8cf8382713cec48a73677e4d7f32d7ae2d8741ff80e439e4eedb10aebafed22c966f4aae52ed6002df4bf

      • C:\Windows\SysWOW64\snvmyrtdaq.exe

        Filesize

        255KB

        MD5

        39c0e425a3a2d0ea9b527984c45f4329

        SHA1

        1bc196766be790ee78d454aa96c05eee32da23df

        SHA256

        8ec0763d37d53e7af043ee8c38a948065d0de1ea7c2f4850b573cda674a2bcab

        SHA512

        d6e70012cc2b50786d82c9a3ddbbcb3081f5b0e195e8cf8382713cec48a73677e4d7f32d7ae2d8741ff80e439e4eedb10aebafed22c966f4aae52ed6002df4bf

      • memory/1452-157-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1452-152-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1684-140-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1684-154-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4136-151-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4136-156-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4536-159-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4536-132-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4700-139-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4700-153-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4904-150-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/4904-155-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB