Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    187s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 06:12

General

  • Target

    36a425dc83d6c26a23b9e5d95351588317fcd2563914d73ca6c4b3664cf341bc.exe

  • Size

    255KB

  • MD5

    1e2f424781f6afd497d001af661967ac

  • SHA1

    4e8c7765733528536460909fe30297b25fb30843

  • SHA256

    36a425dc83d6c26a23b9e5d95351588317fcd2563914d73ca6c4b3664cf341bc

  • SHA512

    76b72bd84def252534143664a088695fccf1e8b4e18ba1de36a6ea76fe34316a7df37ce597766a34b08247f937fb3758312a81c63739b9bc6f6c0142434c744d

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI62:Plf5j6zCNa0xeE3mD

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36a425dc83d6c26a23b9e5d95351588317fcd2563914d73ca6c4b3664cf341bc.exe
    "C:\Users\Admin\AppData\Local\Temp\36a425dc83d6c26a23b9e5d95351588317fcd2563914d73ca6c4b3664cf341bc.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\sboysqswma.exe
      sboysqswma.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Windows\SysWOW64\lfpigqvy.exe
        C:\Windows\system32\lfpigqvy.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:300
    • C:\Windows\SysWOW64\cxhtpexozekvcgb.exe
      cxhtpexozekvcgb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:268
    • C:\Windows\SysWOW64\lfpigqvy.exe
      lfpigqvy.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:656
    • C:\Windows\SysWOW64\xfvdskqrqogrg.exe
      xfvdskqrqogrg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:336
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:304
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      e1e6416f1360e4594eebd744886793db

      SHA1

      5b0b9bec20429d48922b02908a1ff353b00f2e86

      SHA256

      800a33cb54df4213ba299706ba13c982dcb15cdf15b410cd3626c5625e76d133

      SHA512

      3e3edc3f7a602ba2a3161048892186967e9c6a63cefb2b37e91955f4f51508c06da218cc967ba1f6fc534f7367d5aa4b72351a75fb122b0b15b858e60b62bd20

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      1a9218a5830ec5630f0acdd6078e1581

      SHA1

      677e6c48c7493bd91160adae8b922d1936a23888

      SHA256

      7074133b549b7729c2fd0f98681657937f513896dc81a672744b19572d2bfdeb

      SHA512

      a2cb4a886852351037f13ef372f921a6790d22328845f5d466ae91da065b68cbd62741c216d0906e96e1cedbd16e9799a6b74dbafb06f67554cd7bf0f1ef3f92

    • C:\Users\Admin\Desktop\UpdateComplete.doc.exe

      Filesize

      255KB

      MD5

      bb258ec8c01b721ba3ee462dcfd5a18a

      SHA1

      70162bb1403a509ce977434faf9b59f62228a5a3

      SHA256

      a341ffe5e95c68970c4a78d9fa542a7386430218164f871ff0e46c3259a836c5

      SHA512

      307c0d0ad041154666b84b9eb8f80f032c5f7d9884549fc333feafa48fe10effb5fa3cac5c8dcd7d74a2d89a87294751613b5fc8aae422e931049689ffe3eda4

    • C:\Windows\SysWOW64\cxhtpexozekvcgb.exe

      Filesize

      255KB

      MD5

      d7593c3d7b439fb4625a76dc80f6d38b

      SHA1

      a319f8586a8a69dc6fb9536748c79cfab34cabf0

      SHA256

      b96cb2f72e8a57a5403d60559ed370bb939c62f46e1164278e84c47bd26315d0

      SHA512

      9520cf4f1e46d7b0bcf1df760fe14a6fbd10059c6add203fb865cb35d9ffc85d735d6a0d897e0433acfced9cd273beb0ae1142cd3cfa67cc59bb9e19d5e68f19

    • C:\Windows\SysWOW64\cxhtpexozekvcgb.exe

      Filesize

      255KB

      MD5

      d7593c3d7b439fb4625a76dc80f6d38b

      SHA1

      a319f8586a8a69dc6fb9536748c79cfab34cabf0

      SHA256

      b96cb2f72e8a57a5403d60559ed370bb939c62f46e1164278e84c47bd26315d0

      SHA512

      9520cf4f1e46d7b0bcf1df760fe14a6fbd10059c6add203fb865cb35d9ffc85d735d6a0d897e0433acfced9cd273beb0ae1142cd3cfa67cc59bb9e19d5e68f19

    • C:\Windows\SysWOW64\lfpigqvy.exe

      Filesize

      255KB

      MD5

      cc1f5a103ca16ae23fb6c93f3ec710da

      SHA1

      5ce0884c25d1b2a03d928063f4b07cc8e7c295fc

      SHA256

      9c2514acc62b861976da712d427b31bb6b15e10e08a22ebfafe1d0b2eab101af

      SHA512

      9d5eeb3f4f4afad2923a1af12dfafc3dd8048e4c7265c5a0672100c5401add47eee68c9b426da5214d327650dee40afb4907251725b8192eb05423e4cf6c850a

    • C:\Windows\SysWOW64\lfpigqvy.exe

      Filesize

      255KB

      MD5

      cc1f5a103ca16ae23fb6c93f3ec710da

      SHA1

      5ce0884c25d1b2a03d928063f4b07cc8e7c295fc

      SHA256

      9c2514acc62b861976da712d427b31bb6b15e10e08a22ebfafe1d0b2eab101af

      SHA512

      9d5eeb3f4f4afad2923a1af12dfafc3dd8048e4c7265c5a0672100c5401add47eee68c9b426da5214d327650dee40afb4907251725b8192eb05423e4cf6c850a

    • C:\Windows\SysWOW64\lfpigqvy.exe

      Filesize

      255KB

      MD5

      cc1f5a103ca16ae23fb6c93f3ec710da

      SHA1

      5ce0884c25d1b2a03d928063f4b07cc8e7c295fc

      SHA256

      9c2514acc62b861976da712d427b31bb6b15e10e08a22ebfafe1d0b2eab101af

      SHA512

      9d5eeb3f4f4afad2923a1af12dfafc3dd8048e4c7265c5a0672100c5401add47eee68c9b426da5214d327650dee40afb4907251725b8192eb05423e4cf6c850a

    • C:\Windows\SysWOW64\sboysqswma.exe

      Filesize

      255KB

      MD5

      231da4fca6d7ceb316a3e95243cef0e5

      SHA1

      ac6648e4e686673cf74b0e7b63743f368e6bd610

      SHA256

      262ba1b2a4ebcbb6ff632b088d7e2fb910daa0ffe6c85c16b3a566d9f2eb2358

      SHA512

      5798a216ef7f49236d4b061ff1d089b75a830a21a23a4a15815d1aa62ae2c7c11f1c45a4cea0de9ea4537b3041ee7e657a5a91b224fb75c6ab999f40581669e9

    • C:\Windows\SysWOW64\sboysqswma.exe

      Filesize

      255KB

      MD5

      231da4fca6d7ceb316a3e95243cef0e5

      SHA1

      ac6648e4e686673cf74b0e7b63743f368e6bd610

      SHA256

      262ba1b2a4ebcbb6ff632b088d7e2fb910daa0ffe6c85c16b3a566d9f2eb2358

      SHA512

      5798a216ef7f49236d4b061ff1d089b75a830a21a23a4a15815d1aa62ae2c7c11f1c45a4cea0de9ea4537b3041ee7e657a5a91b224fb75c6ab999f40581669e9

    • C:\Windows\SysWOW64\xfvdskqrqogrg.exe

      Filesize

      255KB

      MD5

      59c2ea69e2a5086b03f085922baa2e2c

      SHA1

      e8b239b04ff433932099a13e56b85ca813f490ed

      SHA256

      af56128ff6bb2e6961ea160cf7f1fb08851e269c34c2cd9b3df9874965c799ad

      SHA512

      141476e368ae67bf547e668e4e7be19122fcdd4c2cebdd4de98a5fb1d6ea9617cf610b2ac6dd91fa8565ad0cd79dea501f63e3848e140737ab87652278769ca9

    • C:\Windows\SysWOW64\xfvdskqrqogrg.exe

      Filesize

      255KB

      MD5

      59c2ea69e2a5086b03f085922baa2e2c

      SHA1

      e8b239b04ff433932099a13e56b85ca813f490ed

      SHA256

      af56128ff6bb2e6961ea160cf7f1fb08851e269c34c2cd9b3df9874965c799ad

      SHA512

      141476e368ae67bf547e668e4e7be19122fcdd4c2cebdd4de98a5fb1d6ea9617cf610b2ac6dd91fa8565ad0cd79dea501f63e3848e140737ab87652278769ca9

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\cxhtpexozekvcgb.exe

      Filesize

      255KB

      MD5

      d7593c3d7b439fb4625a76dc80f6d38b

      SHA1

      a319f8586a8a69dc6fb9536748c79cfab34cabf0

      SHA256

      b96cb2f72e8a57a5403d60559ed370bb939c62f46e1164278e84c47bd26315d0

      SHA512

      9520cf4f1e46d7b0bcf1df760fe14a6fbd10059c6add203fb865cb35d9ffc85d735d6a0d897e0433acfced9cd273beb0ae1142cd3cfa67cc59bb9e19d5e68f19

    • \Windows\SysWOW64\lfpigqvy.exe

      Filesize

      255KB

      MD5

      cc1f5a103ca16ae23fb6c93f3ec710da

      SHA1

      5ce0884c25d1b2a03d928063f4b07cc8e7c295fc

      SHA256

      9c2514acc62b861976da712d427b31bb6b15e10e08a22ebfafe1d0b2eab101af

      SHA512

      9d5eeb3f4f4afad2923a1af12dfafc3dd8048e4c7265c5a0672100c5401add47eee68c9b426da5214d327650dee40afb4907251725b8192eb05423e4cf6c850a

    • \Windows\SysWOW64\lfpigqvy.exe

      Filesize

      255KB

      MD5

      cc1f5a103ca16ae23fb6c93f3ec710da

      SHA1

      5ce0884c25d1b2a03d928063f4b07cc8e7c295fc

      SHA256

      9c2514acc62b861976da712d427b31bb6b15e10e08a22ebfafe1d0b2eab101af

      SHA512

      9d5eeb3f4f4afad2923a1af12dfafc3dd8048e4c7265c5a0672100c5401add47eee68c9b426da5214d327650dee40afb4907251725b8192eb05423e4cf6c850a

    • \Windows\SysWOW64\sboysqswma.exe

      Filesize

      255KB

      MD5

      231da4fca6d7ceb316a3e95243cef0e5

      SHA1

      ac6648e4e686673cf74b0e7b63743f368e6bd610

      SHA256

      262ba1b2a4ebcbb6ff632b088d7e2fb910daa0ffe6c85c16b3a566d9f2eb2358

      SHA512

      5798a216ef7f49236d4b061ff1d089b75a830a21a23a4a15815d1aa62ae2c7c11f1c45a4cea0de9ea4537b3041ee7e657a5a91b224fb75c6ab999f40581669e9

    • \Windows\SysWOW64\xfvdskqrqogrg.exe

      Filesize

      255KB

      MD5

      59c2ea69e2a5086b03f085922baa2e2c

      SHA1

      e8b239b04ff433932099a13e56b85ca813f490ed

      SHA256

      af56128ff6bb2e6961ea160cf7f1fb08851e269c34c2cd9b3df9874965c799ad

      SHA512

      141476e368ae67bf547e668e4e7be19122fcdd4c2cebdd4de98a5fb1d6ea9617cf610b2ac6dd91fa8565ad0cd79dea501f63e3848e140737ab87652278769ca9

    • memory/268-77-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/268-95-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/300-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/300-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/304-87-0x0000000072DC1000-0x0000000072DC4000-memory.dmp

      Filesize

      12KB

    • memory/304-90-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/304-101-0x000000007182D000-0x0000000071838000-memory.dmp

      Filesize

      44KB

    • memory/304-107-0x000000007182D000-0x0000000071838000-memory.dmp

      Filesize

      44KB

    • memory/304-88-0x0000000070841000-0x0000000070843000-memory.dmp

      Filesize

      8KB

    • memory/304-93-0x000000007182D000-0x0000000071838000-memory.dmp

      Filesize

      44KB

    • memory/304-106-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/336-79-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/336-97-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/656-78-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/656-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/880-99-0x00000000038C0000-0x0000000003960000-memory.dmp

      Filesize

      640KB

    • memory/880-94-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/880-75-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1628-76-0x0000000002250000-0x00000000022F0000-memory.dmp

      Filesize

      640KB

    • memory/1628-86-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1628-55-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1628-54-0x00000000760D1000-0x00000000760D3000-memory.dmp

      Filesize

      8KB

    • memory/1648-102-0x000007FEFC2D1000-0x000007FEFC2D3000-memory.dmp

      Filesize

      8KB