Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    203s
  • max time network
    211s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 01:53

General

  • Target

    0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe

  • Size

    255KB

  • MD5

    a7bacf197f0261d4a029e9a7a95ee93e

  • SHA1

    7613042c9aa1f9cb49ddcb590262efa4c3b93d1c

  • SHA256

    0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2

  • SHA512

    0dcef6e6271c7617ec36e2b1c00ff07c70889b3584383f861f8427b6fda1d45d2ac3829beb95d089f98af24d38e6b87b13c405f3b373c25847767317bb115b90

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJc:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIb

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe
    "C:\Users\Admin\AppData\Local\Temp\0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Windows\SysWOW64\qxqfvyusrr.exe
      qxqfvyusrr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Windows\SysWOW64\brnflunj.exe
        C:\Windows\system32\brnflunj.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1920
    • C:\Windows\SysWOW64\cvcmhxyzivwbqpe.exe
      cvcmhxyzivwbqpe.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4372
    • C:\Windows\SysWOW64\brnflunj.exe
      brnflunj.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3500
    • C:\Windows\SysWOW64\utpxxlaidupyq.exe
      utpxxlaidupyq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:448
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    3d3846f9f36cecd304a9644a96dfdb3c

    SHA1

    28d3bccb7217f630ef879a4672bc99c217226dd5

    SHA256

    3513b3fdfa82dd9b0c5c5ccbe103ea6e6881b45079d225c8aa8220e02ca948f2

    SHA512

    0c69897f74262294ad8e9c452f88e6b7bc0b45cbd206a17fdac17668d23bd800201dbd55a9762436fc58e5983ea335b55d0d8c5fccb1600bf575157810c216fa

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    490e0e0a9cf3b2f8324b8e37d483fb85

    SHA1

    6221af0813e8b9d3a043c024824a3f387352d458

    SHA256

    b24bfd4cdfdf2077147ac1bddc90f39a80c79bbb5772394bfd102ca8cadd2a55

    SHA512

    125477008512545cefc60ecfd6df6a4a1694f18ee5b85c5bb6b611ce7fd587bff1d4e8b827d3684ef30ad69d6520cfb3b15ee792e6e3557e1ef7527a0b95168f

  • C:\Windows\SysWOW64\brnflunj.exe

    Filesize

    255KB

    MD5

    b60c9f3b9dce59f5514746216659919d

    SHA1

    c1092a9bb6d5854181f8484e69838bb88f15c820

    SHA256

    8b9b7df501d215de6a2b7379f5b26b75f0d293eaf67c078c374b28cf8b58bff3

    SHA512

    7d301860c14eec5a10824a3f58ef0c630e6c9fae289a75d632225fe3b4d87446a1d33a40fdec1c4c4571450be40f523ba4f0967f961dfda4547aca28a052d4c6

  • C:\Windows\SysWOW64\brnflunj.exe

    Filesize

    255KB

    MD5

    b60c9f3b9dce59f5514746216659919d

    SHA1

    c1092a9bb6d5854181f8484e69838bb88f15c820

    SHA256

    8b9b7df501d215de6a2b7379f5b26b75f0d293eaf67c078c374b28cf8b58bff3

    SHA512

    7d301860c14eec5a10824a3f58ef0c630e6c9fae289a75d632225fe3b4d87446a1d33a40fdec1c4c4571450be40f523ba4f0967f961dfda4547aca28a052d4c6

  • C:\Windows\SysWOW64\brnflunj.exe

    Filesize

    255KB

    MD5

    b60c9f3b9dce59f5514746216659919d

    SHA1

    c1092a9bb6d5854181f8484e69838bb88f15c820

    SHA256

    8b9b7df501d215de6a2b7379f5b26b75f0d293eaf67c078c374b28cf8b58bff3

    SHA512

    7d301860c14eec5a10824a3f58ef0c630e6c9fae289a75d632225fe3b4d87446a1d33a40fdec1c4c4571450be40f523ba4f0967f961dfda4547aca28a052d4c6

  • C:\Windows\SysWOW64\cvcmhxyzivwbqpe.exe

    Filesize

    255KB

    MD5

    488e1aaf5b5171e24082bfc30639a131

    SHA1

    5a25b8fce1e87e9b3ee981187624b4cdb9825389

    SHA256

    788adf601994a4db49ab97ddbe4a78bcc4bb00556908f56f7ba3174bd6bc41e9

    SHA512

    7c3de529df3e4a6f9ae9dd56ea94c95ca0e28f208d9b2154e7fedfbeedaa1d309092c0fee34c3a5c277f023d368d17b5541e616f98471177b66cef1685f040e6

  • C:\Windows\SysWOW64\cvcmhxyzivwbqpe.exe

    Filesize

    255KB

    MD5

    488e1aaf5b5171e24082bfc30639a131

    SHA1

    5a25b8fce1e87e9b3ee981187624b4cdb9825389

    SHA256

    788adf601994a4db49ab97ddbe4a78bcc4bb00556908f56f7ba3174bd6bc41e9

    SHA512

    7c3de529df3e4a6f9ae9dd56ea94c95ca0e28f208d9b2154e7fedfbeedaa1d309092c0fee34c3a5c277f023d368d17b5541e616f98471177b66cef1685f040e6

  • C:\Windows\SysWOW64\qxqfvyusrr.exe

    Filesize

    255KB

    MD5

    76017ffb8265a6f1240591c8756ef3bc

    SHA1

    40a02f90d01377533cf67ca44f994a696f93983c

    SHA256

    5862b99218bb630e5e7625e8dfd425d425cf80de3806699067715f68c9db2962

    SHA512

    95a832459c82ed1622ff75334f220210d7f6aab6c9c0ebe85e3ead075a98feec6e2abffb90b15fd37b0cf87320d63413d0e10cb7da8b8c4934a80a8e6d25e2cd

  • C:\Windows\SysWOW64\qxqfvyusrr.exe

    Filesize

    255KB

    MD5

    76017ffb8265a6f1240591c8756ef3bc

    SHA1

    40a02f90d01377533cf67ca44f994a696f93983c

    SHA256

    5862b99218bb630e5e7625e8dfd425d425cf80de3806699067715f68c9db2962

    SHA512

    95a832459c82ed1622ff75334f220210d7f6aab6c9c0ebe85e3ead075a98feec6e2abffb90b15fd37b0cf87320d63413d0e10cb7da8b8c4934a80a8e6d25e2cd

  • C:\Windows\SysWOW64\utpxxlaidupyq.exe

    Filesize

    255KB

    MD5

    7f3ec16ce3979cc37e77029020d0b5d3

    SHA1

    90c64564af5bafbeac606d53eb9427e1a9dbb500

    SHA256

    d377419a710ba35f4ef5fd93b46e336bb737dbcee9508bd464fc829d436b630d

    SHA512

    00f4cf6e620b35435340835f2fb440725f2a85d440251a5bdc09f3330e4dbf4e90d121f448911670521c4388333c6a8148f76748e5b9f5dd94da9a97225aac85

  • C:\Windows\SysWOW64\utpxxlaidupyq.exe

    Filesize

    255KB

    MD5

    7f3ec16ce3979cc37e77029020d0b5d3

    SHA1

    90c64564af5bafbeac606d53eb9427e1a9dbb500

    SHA256

    d377419a710ba35f4ef5fd93b46e336bb737dbcee9508bd464fc829d436b630d

    SHA512

    00f4cf6e620b35435340835f2fb440725f2a85d440251a5bdc09f3330e4dbf4e90d121f448911670521c4388333c6a8148f76748e5b9f5dd94da9a97225aac85

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/448-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/448-158-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1360-162-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-167-0x00007FF9EEB20000-0x00007FF9EEB30000-memory.dmp

    Filesize

    64KB

  • memory/1360-174-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-173-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-164-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-172-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-165-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-171-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-168-0x00007FF9EEB20000-0x00007FF9EEB30000-memory.dmp

    Filesize

    64KB

  • memory/1360-163-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1360-166-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/1920-159-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1920-152-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3304-154-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3304-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3304-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3500-157-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3500-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3848-145-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3848-155-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4372-156-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4372-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB