Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 01:34

General

  • Target

    2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe

  • Size

    255KB

  • MD5

    1822850d29dfc0fdbdd89d4c45c9ad0a

  • SHA1

    99a2030540c86bdfa3599cbc5b19aea25abeb4bd

  • SHA256

    2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3

  • SHA512

    8b17a1198c601160248135696f76211626505ce69b70e823fec0fc44148fae68e01c4981603244845dc3895db4d6e70b9cef5c03faa753e160b75446dd91d422

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJg:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIp

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe
    "C:\Users\Admin\AppData\Local\Temp\2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\SysWOW64\xciubxkjjm.exe
      xciubxkjjm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\SysWOW64\juvexhwf.exe
        C:\Windows\system32\juvexhwf.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1792
    • C:\Windows\SysWOW64\gmkxgantbfwpnjv.exe
      gmkxgantbfwpnjv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c gcvqeecpcselo.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\gcvqeecpcselo.exe
          gcvqeecpcselo.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:544
    • C:\Windows\SysWOW64\juvexhwf.exe
      juvexhwf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1844
    • C:\Windows\SysWOW64\gcvqeecpcselo.exe
      gcvqeecpcselo.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1372
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      5b1db5379fb962e105f1b3b4defbdc51

      SHA1

      4054822e664d7831657fb95767266df262b5ca3f

      SHA256

      51a657a6132c00511662f9dcb6bff93d7a98acf144c65fd7a9d5f506c4453b18

      SHA512

      a165b77a2766a06d0b83db0677b9bf9dd80e589a641b561d71fd6777d98b14af87e97a87e0d09903b1e3aa15286d834c81187d42b72f04d6878b0299e9d85c4b

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      eb8fcb791189bb2799c74491a32809b4

      SHA1

      243291e3a33fa9ac769eeffd140998d521a937cc

      SHA256

      8b58234e099a34d1ba421067a3a674153992f146c3f8e3940c6ab0be43dc6019

      SHA512

      e5238914e018b658bb52494aea93d209cde3af97337b9987d1d58271a09fb67285045270d242220fa064b74a4aa5484b8a9735439f6491185591e069d3e40c4d

    • C:\Users\Admin\Documents\UninstallBlock.doc.exe

      Filesize

      255KB

      MD5

      094bc32748b59d466e58012ef4a6dd42

      SHA1

      21ce2cdffa622d03bd9660e1f9fc54c8a233a89a

      SHA256

      d8c0536e17aa984455e9626dd6a93303ea90b1ddf47cd030857ded49f70c1048

      SHA512

      89486a3434da095f2094a63b2173a0f6778db8422fe325d61d46d24d4cb40abc08fd3eca7b0437ff99c26856d00aa2e22928ca2b0f6357ea7380d3797c58bf07

    • C:\Windows\SysWOW64\gcvqeecpcselo.exe

      Filesize

      255KB

      MD5

      d058ecb14fb750d3e986a55ca0dc8b17

      SHA1

      322237522dd668b8fc3c2967b1a22e95379b943a

      SHA256

      7f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e

      SHA512

      2151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2

    • C:\Windows\SysWOW64\gcvqeecpcselo.exe

      Filesize

      255KB

      MD5

      d058ecb14fb750d3e986a55ca0dc8b17

      SHA1

      322237522dd668b8fc3c2967b1a22e95379b943a

      SHA256

      7f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e

      SHA512

      2151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2

    • C:\Windows\SysWOW64\gcvqeecpcselo.exe

      Filesize

      255KB

      MD5

      d058ecb14fb750d3e986a55ca0dc8b17

      SHA1

      322237522dd668b8fc3c2967b1a22e95379b943a

      SHA256

      7f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e

      SHA512

      2151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2

    • C:\Windows\SysWOW64\gmkxgantbfwpnjv.exe

      Filesize

      255KB

      MD5

      3d799c49cfdd93d5fa05db3eb4212d76

      SHA1

      f21e2b8e62edd8e140b9bbe88c410aa5baec11e0

      SHA256

      ae53f33f537072fb092a203d150c53a2a281a4f16a3548a3ac31fff58ecc94a7

      SHA512

      ec12f84312bfa9e607694d053c4942aa8de65ce0db60a0326d1b2f8c2155d4aece96ac2777cd0d47548d0797a33940b579bb0d0a02d561b6663ec0e1fc0af238

    • C:\Windows\SysWOW64\gmkxgantbfwpnjv.exe

      Filesize

      255KB

      MD5

      3d799c49cfdd93d5fa05db3eb4212d76

      SHA1

      f21e2b8e62edd8e140b9bbe88c410aa5baec11e0

      SHA256

      ae53f33f537072fb092a203d150c53a2a281a4f16a3548a3ac31fff58ecc94a7

      SHA512

      ec12f84312bfa9e607694d053c4942aa8de65ce0db60a0326d1b2f8c2155d4aece96ac2777cd0d47548d0797a33940b579bb0d0a02d561b6663ec0e1fc0af238

    • C:\Windows\SysWOW64\juvexhwf.exe

      Filesize

      255KB

      MD5

      0076e4cef31a3cfec223d8b0058e13b6

      SHA1

      46b82756b60689054db1fac311fca708b29c1ed4

      SHA256

      700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2

      SHA512

      dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399

    • C:\Windows\SysWOW64\juvexhwf.exe

      Filesize

      255KB

      MD5

      0076e4cef31a3cfec223d8b0058e13b6

      SHA1

      46b82756b60689054db1fac311fca708b29c1ed4

      SHA256

      700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2

      SHA512

      dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399

    • C:\Windows\SysWOW64\juvexhwf.exe

      Filesize

      255KB

      MD5

      0076e4cef31a3cfec223d8b0058e13b6

      SHA1

      46b82756b60689054db1fac311fca708b29c1ed4

      SHA256

      700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2

      SHA512

      dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399

    • C:\Windows\SysWOW64\xciubxkjjm.exe

      Filesize

      255KB

      MD5

      0e224204cfbe1592d4bb05bcc5ee9e71

      SHA1

      2ba6ac220e9d0458f0e7c4cf048c0aeb5d5fb0da

      SHA256

      3953b3ee5a66991d7194bf4b264b3ea5af801b403e6a32ad33b6cf0bf83130e1

      SHA512

      6a682d1e6a0ea5b8c0b378ef1a37fb1c9d19a1cfd4e004ebb7b209e5fa70879b1ee1b421b919e22b96130a58b9d3069428d000cad16bd1497978a65c6c5a19c4

    • C:\Windows\SysWOW64\xciubxkjjm.exe

      Filesize

      255KB

      MD5

      0e224204cfbe1592d4bb05bcc5ee9e71

      SHA1

      2ba6ac220e9d0458f0e7c4cf048c0aeb5d5fb0da

      SHA256

      3953b3ee5a66991d7194bf4b264b3ea5af801b403e6a32ad33b6cf0bf83130e1

      SHA512

      6a682d1e6a0ea5b8c0b378ef1a37fb1c9d19a1cfd4e004ebb7b209e5fa70879b1ee1b421b919e22b96130a58b9d3069428d000cad16bd1497978a65c6c5a19c4

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\gcvqeecpcselo.exe

      Filesize

      255KB

      MD5

      d058ecb14fb750d3e986a55ca0dc8b17

      SHA1

      322237522dd668b8fc3c2967b1a22e95379b943a

      SHA256

      7f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e

      SHA512

      2151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2

    • \Windows\SysWOW64\gcvqeecpcselo.exe

      Filesize

      255KB

      MD5

      d058ecb14fb750d3e986a55ca0dc8b17

      SHA1

      322237522dd668b8fc3c2967b1a22e95379b943a

      SHA256

      7f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e

      SHA512

      2151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2

    • \Windows\SysWOW64\gmkxgantbfwpnjv.exe

      Filesize

      255KB

      MD5

      3d799c49cfdd93d5fa05db3eb4212d76

      SHA1

      f21e2b8e62edd8e140b9bbe88c410aa5baec11e0

      SHA256

      ae53f33f537072fb092a203d150c53a2a281a4f16a3548a3ac31fff58ecc94a7

      SHA512

      ec12f84312bfa9e607694d053c4942aa8de65ce0db60a0326d1b2f8c2155d4aece96ac2777cd0d47548d0797a33940b579bb0d0a02d561b6663ec0e1fc0af238

    • \Windows\SysWOW64\juvexhwf.exe

      Filesize

      255KB

      MD5

      0076e4cef31a3cfec223d8b0058e13b6

      SHA1

      46b82756b60689054db1fac311fca708b29c1ed4

      SHA256

      700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2

      SHA512

      dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399

    • \Windows\SysWOW64\juvexhwf.exe

      Filesize

      255KB

      MD5

      0076e4cef31a3cfec223d8b0058e13b6

      SHA1

      46b82756b60689054db1fac311fca708b29c1ed4

      SHA256

      700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2

      SHA512

      dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399

    • \Windows\SysWOW64\xciubxkjjm.exe

      Filesize

      255KB

      MD5

      0e224204cfbe1592d4bb05bcc5ee9e71

      SHA1

      2ba6ac220e9d0458f0e7c4cf048c0aeb5d5fb0da

      SHA256

      3953b3ee5a66991d7194bf4b264b3ea5af801b403e6a32ad33b6cf0bf83130e1

      SHA512

      6a682d1e6a0ea5b8c0b378ef1a37fb1c9d19a1cfd4e004ebb7b209e5fa70879b1ee1b421b919e22b96130a58b9d3069428d000cad16bd1497978a65c6c5a19c4

    • memory/544-97-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-106-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/856-101-0x00000000714BD000-0x00000000714C8000-memory.dmp

      Filesize

      44KB

    • memory/856-94-0x0000000072A51000-0x0000000072A54000-memory.dmp

      Filesize

      12KB

    • memory/856-114-0x00000000714BD000-0x00000000714C8000-memory.dmp

      Filesize

      44KB

    • memory/856-113-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/856-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/856-95-0x00000000704D1000-0x00000000704D3000-memory.dmp

      Filesize

      8KB

    • memory/944-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/944-77-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1204-76-0x0000000003350000-0x00000000033F0000-memory.dmp

      Filesize

      640KB

    • memory/1204-54-0x0000000075E31000-0x0000000075E33000-memory.dmp

      Filesize

      8KB

    • memory/1204-73-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1204-82-0x0000000003350000-0x00000000033F0000-memory.dmp

      Filesize

      640KB

    • memory/1204-93-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1204-78-0x0000000003350000-0x00000000033F0000-memory.dmp

      Filesize

      640KB

    • memory/1372-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1372-83-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1648-112-0x000007FEFC101000-0x000007FEFC103000-memory.dmp

      Filesize

      8KB

    • memory/1792-98-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1792-107-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1844-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1844-80-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2004-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2004-79-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB