Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 22:00

General

  • Target

    fef511b82c03e2688fdd65cbcc5db0913e56a758cb807a68ebbee40ce9247cd6.exe

  • Size

    1.3MB

  • MD5

    c87e6052317241f9570af67c735f1ca5

  • SHA1

    cfab47f14ffbe675f37a23b0b68592d99f71d277

  • SHA256

    fef511b82c03e2688fdd65cbcc5db0913e56a758cb807a68ebbee40ce9247cd6

  • SHA512

    314fcb39162f8522fa23cfd266619f999821bcc53472b1d4b849daec50fb9162b830a95ae6516560e038ed4c8eb4914330bc5c95488bc140ce15e07114312f0f

  • SSDEEP

    24576:WogxC6bgpTVdx9nI7XN7u0qJ8e3Xqd5nKSlhBqMY1wpZdvF/1XfGKE53PI9Bd9:mbATN9Iu0qJ8e3uj61891C6n9

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fef511b82c03e2688fdd65cbcc5db0913e56a758cb807a68ebbee40ce9247cd6.exe
    "C:\Users\Admin\AppData\Local\Temp\fef511b82c03e2688fdd65cbcc5db0913e56a758cb807a68ebbee40ce9247cd6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe
      "C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe" /setupsucc
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      PID:2044
    • C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe
      "C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe" /autorun /setuprun
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2032
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x50c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ONXID7T\sq.tab[1].js

    Filesize

    1KB

    MD5

    6307cfff3a79c1debdfbb74e362d2bd9

    SHA1

    2f16c517cd6ec52c2a6a978ebbff8861412c006e

    SHA256

    bf8cf01a18233cf567e7638e3115c7145ac0b09698a2ec85980e23826366d784

    SHA512

    224d3bb8bbeb34d03b077d31133a98080dcda90bb2963d981fbd49a0cc156c2c6e668927403c8c4e54d012fca0011093259a082cdbc0e36ad5de23339c61bfaf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DE9Y0H7M\game1[1].css

    Filesize

    15KB

    MD5

    8dbeef3e19b20ad02654e9b9c219eb02

    SHA1

    aadfca52eb75a9a14f05ceda9dba7a8302daad54

    SHA256

    beba18691b3d14a7dee814a4b8ce2373911314e857ab1c1ac7d823b4e1c3e686

    SHA512

    a6b2ff2e2e0e5a2bf0076d580554b2c713987f3412020183c4bb0a153608f672c418f3ba8b864c4bd27f5d5728190a59fbba1328b11fff79024055f2c9ac65b5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DE9Y0H7M\sq.statis[1].js

    Filesize

    6KB

    MD5

    4cbb9b6d17984b8e56d6e2ada30b29b9

    SHA1

    f894c6641b9df2de5b7b9cafc5704e72859ed370

    SHA256

    746b3b3ab8a597e6d6b753ebd409f496c19422bfa75d6b3cf42f4b74e8dc6c91

    SHA512

    eb9fbfdcdf72dcb0195002b55c92b0861aeb095ed27fc976e4f4dc10812a5b36e07490df0f31fca80ecf34d58e8d04ceebbe7caa6f5617dbe6db66d94135c57f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\game1[1].js

    Filesize

    49KB

    MD5

    2bc779315ac48a71ab94b013d30bee6f

    SHA1

    0506df9380211bfad74df5c6bcfed256aa459e8a

    SHA256

    6b44c4e89c2434e0a934bd58190a2b039f671c34332d2886f7b11b0de4ba4dca

    SHA512

    b8e6316d515f8b2ed58932fe897868af0fca79d9b85b5ed8c9d9c0389e68bbbe527bdf30e4712986c9a1e680e1a5a6bd39632b303980e53746cf18907983296e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\sq.core[1].js

    Filesize

    100KB

    MD5

    f583e8b1f035f0d7f4ff01bc155d261b

    SHA1

    fc5589d91b064fe95706b7a16e841ea847f5e8fc

    SHA256

    ea4580a816ad527e6cd5dc30ab5c69e2882f5790143b133d61d12b4a726fa27d

    SHA512

    b561ed2d1a87b66b64299d569b080e27cf343aa4da5495fd62f5b615b97e87edb2d9ff779f712f1c1a5e356ce6a4b814a24d95df27573f2a549b34e35a430a8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NZTPJYNO\sq.login[1].js

    Filesize

    37KB

    MD5

    351e929415829450b5bd8dcd8cd65caa

    SHA1

    f2f70ac0df0b3729af859ce5b82084ca44155c60

    SHA256

    97b87223c9ed38ca5acc2da4834ea29255a7bec8430603fcdb1f3656a2365003

    SHA512

    f32e6ff1b7b4c4e96840c1ffedc717c6b4deeb9a117982937ae9afa3385cb5a9c19094ac0c21441244b367cf244a936692f18ddad3cb5cb03fcea8973b3a8f8c

  • C:\Users\Admin\AppData\Local\Temp\nsy1E1E.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    8614c450637267afacad1645e23ba24a

    SHA1

    e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

    SHA256

    0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

    SHA512

    af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

  • C:\Users\Admin\AppData\Local\Temp\nsy1E1E.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\¸ñ¶·Ö®Éñ.lnk

    Filesize

    876B

    MD5

    bf6d3aa201f41883f4e9260d7df88410

    SHA1

    69f9d2accbff50ff0995310c51fc3fb2a42c6eca

    SHA256

    1fc3c68fb3cd6d4b0117930849d01326db430c4d9577d29085d9068f844719f1

    SHA512

    fc2a1097fc930b3445e6001cdffc85645e7046b9f0c3f8e3713282549800db94fc5ee5e02c297a292edc66f903758b4ada9e23cbf16eb050bcfd819204fecec1

  • C:\Users\Admin\AppData\Roaming\mt_avtp\config.dll

    Filesize

    1.2MB

    MD5

    7c88b1b990628d4ad50f91f404ac3f86

    SHA1

    f6eced5ba6031c853d240d4d30c436e9566ff9b9

    SHA256

    8e82e0bc539c5d825e6d982c5446b0de5f258e03c337f6769f7883951f399502

    SHA512

    7a092b08391e2f9694062e12595ad13319bd2f338fca8966905540ff916c0354ecb1c1421ebb626cf33b10d8f23472e91a3e2964bcd24f1d67025967afabfa74

  • C:\Users\Admin\AppData\Roaming\mt_avtp\config.ini

    Filesize

    367B

    MD5

    a3be92b781183f7efcb905ed6c09c62d

    SHA1

    e2a9b1aba0b50a1885aefefc0478bd152538d825

    SHA256

    95629508fb15f908c96e93b8c847f195d4d05477182916df77b900c8934e4d5f

    SHA512

    37b8687bec275789117f65afea92ef19661dca5d12d2db8dd5da08b62e99367244ea6b8f0056401224cabd3b88826dc4f5d26736fabb00031ea053772b503061

  • C:\Users\Admin\AppData\Roaming\mt_avtp\config.ini

    Filesize

    418B

    MD5

    015fd3713e25ad3a969aea90f9ad8481

    SHA1

    63172734b0e590b0aab7d92f71a1e2c6da2ba4da

    SHA256

    8c1d97715a21e2f9aaf83ada774547cd7e6d4bfe07dbb95c1a14f07953e4fbdf

    SHA512

    194128a5a9d39f8d3965d6252889e2436cf05fd3eec88dcf4e9d08ac57e3eaacaaaed94f9bb071b05a882882abc3e550730171a581a81766985cf95a31efc8f0

  • C:\Users\Admin\AppData\Roaming\mt_avtp\config.ini

    Filesize

    367B

    MD5

    a3be92b781183f7efcb905ed6c09c62d

    SHA1

    e2a9b1aba0b50a1885aefefc0478bd152538d825

    SHA256

    95629508fb15f908c96e93b8c847f195d4d05477182916df77b900c8934e4d5f

    SHA512

    37b8687bec275789117f65afea92ef19661dca5d12d2db8dd5da08b62e99367244ea6b8f0056401224cabd3b88826dc4f5d26736fabb00031ea053772b503061

  • C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • C:\Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • \Users\Admin\AppData\Local\Temp\nsy1E1E.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    8614c450637267afacad1645e23ba24a

    SHA1

    e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

    SHA256

    0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

    SHA512

    af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

  • \Users\Admin\AppData\Local\Temp\nsy1E1E.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    8614c450637267afacad1645e23ba24a

    SHA1

    e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

    SHA256

    0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

    SHA512

    af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

  • \Users\Admin\AppData\Local\Temp\nsy1E1E.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    8614c450637267afacad1645e23ba24a

    SHA1

    e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

    SHA256

    0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

    SHA512

    af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

  • \Users\Admin\AppData\Local\Temp\nsy1E1E.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Roaming\mt_avtp\config.dll

    Filesize

    1.2MB

    MD5

    7c88b1b990628d4ad50f91f404ac3f86

    SHA1

    f6eced5ba6031c853d240d4d30c436e9566ff9b9

    SHA256

    8e82e0bc539c5d825e6d982c5446b0de5f258e03c337f6769f7883951f399502

    SHA512

    7a092b08391e2f9694062e12595ad13319bd2f338fca8966905540ff916c0354ecb1c1421ebb626cf33b10d8f23472e91a3e2964bcd24f1d67025967afabfa74

  • \Users\Admin\AppData\Roaming\mt_avtp\config.dll

    Filesize

    1.2MB

    MD5

    7c88b1b990628d4ad50f91f404ac3f86

    SHA1

    f6eced5ba6031c853d240d4d30c436e9566ff9b9

    SHA256

    8e82e0bc539c5d825e6d982c5446b0de5f258e03c337f6769f7883951f399502

    SHA512

    7a092b08391e2f9694062e12595ad13319bd2f338fca8966905540ff916c0354ecb1c1421ebb626cf33b10d8f23472e91a3e2964bcd24f1d67025967afabfa74

  • \Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • \Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • \Users\Admin\AppData\Roaming\mt_avtp\mxks_wmrd.exe

    Filesize

    31KB

    MD5

    3cc2d22ae3db6945bff8eea6fe019878

    SHA1

    a2fbdf4d7abe423fdee7b01a52941a44d0962559

    SHA256

    5e6f5ce60c83fee67978d6167a3b98ea21f24c56f776cc5b60941a8bcb82d086

    SHA512

    a70db582647407cdbc6478908fc4cbcd68d7b4632a2010735dcc43003538d826c0c535c107a3b48593a3e4c18ad4d4e2b48d35565f4b4224d5becca15648ae73

  • memory/1108-119-0x0000000004660000-0x0000000004663000-memory.dmp

    Filesize

    12KB

  • memory/1108-137-0x0000000001D50000-0x0000000001D53000-memory.dmp

    Filesize

    12KB

  • memory/1108-118-0x00000000004F0000-0x00000000004F3000-memory.dmp

    Filesize

    12KB

  • memory/2032-138-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB