Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:06

General

  • Target

    0fc6146c753eb2f799f0dcdb920b0076.exe

  • Size

    512KB

  • MD5

    0fc6146c753eb2f799f0dcdb920b0076

  • SHA1

    9022e455da04667f417fea82517ff8eb8929ef20

  • SHA256

    baac8dd78ec97ae7e15bd328dd6540d3d6f64a101af3d1b4c59c2844f6cab944

  • SHA512

    12ac8f8d8ec2bbf812153d33d38b6c0a301e041cd2b743c4d8f22281717276bac43652ba1d81972e323283cebce3aa05e2b151f280693f6d7d35b30564761026

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6V:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fc6146c753eb2f799f0dcdb920b0076.exe
    "C:\Users\Admin\AppData\Local\Temp\0fc6146c753eb2f799f0dcdb920b0076.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Windows\SysWOW64\eizuozcq.exe
      eizuozcq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1280
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:1400
      • C:\Windows\SysWOW64\ebjhgcgssqvbg.exe
        ebjhgcgssqvbg.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1136
      • C:\Windows\SysWOW64\eneivcsrwtirbmv.exe
        eneivcsrwtirbmv.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3968
      • C:\Windows\SysWOW64\gwrvlzmgtk.exe
        gwrvlzmgtk.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1504
    • C:\Windows\SysWOW64\eizuozcq.exe
      C:\Windows\system32\eizuozcq.exe
      1⤵
        PID:1032

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        239B

        MD5

        be0da8bd0259e747ab4de49863441778

        SHA1

        addb33f5fe47eda8a72ce0b5fdd2da0ca5921c23

        SHA256

        0f5f777590611da5383b2152485610e4001b6d58b5849461942ba175f608be31

        SHA512

        c301c8e08b7519678adac358f3ae557565be879255f8fc45c9c2692074d9bedc48c2441bcbd0d34075a488bd79b975eabee3a625d4cb570bdd38b452dc2985a3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        c9dd1979da66b9b87d7884e32fbbb4d3

        SHA1

        80e7c40e4892796b0454198d3ca6befc0a0ddbb5

        SHA256

        923a1824b80b573048ef1628fafe48983a8f956042c0c2cdab9d003a0b5640f7

        SHA512

        be39c0d2232c815c885d920c0e27862e4201b15ea2393e7e4b8f62930f2dfaa7bdea3ec45c6540eaef6466fc7543f566f370b69d7a03efbc0b872c2f6b78c5f2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        e907a73737329a18a5d8caa742aad60b

        SHA1

        54e4f25a217de6a21022e8c340823aeca515edf2

        SHA256

        6fedd23299a05d73338c0c352b40c89c057caa0a452878e7b50ef2dc849c4953

        SHA512

        ee7882cdc91bf6ff0ca284be43e236ce98e7682a212abd14942ee75c1778f747d8c59c13ab10325cbcab074aa95cca76b4b88e19a280c0b61606b5b0f93aa711

      • C:\Users\Admin\Downloads\SearchSplit.doc.exe

        Filesize

        145KB

        MD5

        a2aaf40bc7348f5841ae9c5ababff80b

        SHA1

        a80acc0cf6bdf92b92dcaa7c5f336491a5014684

        SHA256

        7ce24a3a3a198f7ff0e2df7b6972c3b55b10fc79ceda2001ab7aba82f948185c

        SHA512

        3cd91a15b9c18edeb2e14e1d5c2f4608f8785bedadb22125713211aa6b68cfbd0fe3d5dabc24d360b18791ae4e2a126997d4b670296e3620c7d3f64a7a30db78

      • C:\Windows\SysWOW64\ebjhgcgssqvbg.exe

        Filesize

        22KB

        MD5

        20cb646c115f338fd6e44ecebc99d960

        SHA1

        e2ea3518c18eba15b7b98bf60a095ea4a7e01d26

        SHA256

        441f002b56c4b00b75ed7aa606cc3825427ec41e4bf70a9627b662849b6bf2a2

        SHA512

        d6f8b3cce6d1b65d8edd917b0c3ec459ac30a9345a46c7f2ae4f81733a601fc09d102b3eeb610a12069da5ca70107e1c141a067b6da9fe6e8a856b9b105091b4

      • C:\Windows\SysWOW64\ebjhgcgssqvbg.exe

        Filesize

        60KB

        MD5

        b41efc2b6394a9e85d9383a68696160d

        SHA1

        eddb1ac0bbd0318e6bcff357596b993d08f1301a

        SHA256

        c6694ef71601f2108b5c99ba931101a19c47ea45545695abe5a0016a065f12b4

        SHA512

        3f715019b9d16ccb39d712661d5bc03a2e591a1ea4b903758ceae64b13f7ff39d8d66030701ecc06c3066f81f587c8abccce5636de95faa816d59ea830d38ad9

      • C:\Windows\SysWOW64\eizuozcq.exe

        Filesize

        32KB

        MD5

        373bb9537dbfb3eee05d025f4a747bd4

        SHA1

        d09b33b7a4b6a7d843b35ac4e90532748cebed9f

        SHA256

        a957a2cfa2bd7581dcc7fcf6e15e8f09bc932505a8f940dd6f41cbf1192f7cfc

        SHA512

        337b0132fc1d7ae39e35602b30fd9b88d98863f2275c5fc699a89d90559f917e5f7fbdbfd66e48ae103993754ef3e18e27ffba63e3c13f426d822ffce82b68c3

      • C:\Windows\SysWOW64\eizuozcq.exe

        Filesize

        12KB

        MD5

        4b6143930006d610dfb801443938b34f

        SHA1

        09a11758440d7f3c1f8519e4e4b40467fe71b36d

        SHA256

        1e9be188d1365d50421e37def997f7ee6c4daca825e1ecac3804300c08005478

        SHA512

        cecf9b0e236efedce75bfe9b21364fc21e760deaff9fcef3afb85dad435594b1587f5ca726062e7576ea11b913ee4a8a85ba328595b3344a471644d70ee68027

      • C:\Windows\SysWOW64\eizuozcq.exe

        Filesize

        111KB

        MD5

        9be9e0ffa44813e586c24930a17fb56a

        SHA1

        bad6cec4cd3a780bf6270da2e87c04ae67710ce8

        SHA256

        72dd05c7b59532acbf31867c753e49c703260eb7d01f04b1dabf73aad007df34

        SHA512

        aae3d23b4b3db27c1238a81e851ee8e409a48b35a1736b35a649a3343a98a93e1e05996ac06c5ddb449517d17ce53412a301691576766d9ee6cf26a3993eb102

      • C:\Windows\SysWOW64\eneivcsrwtirbmv.exe

        Filesize

        146KB

        MD5

        2fb092fdcc7182954d53b7c3f13dfb5f

        SHA1

        42c82a3349d7f7c750f4aea3745e0183da43cbaa

        SHA256

        a1cbabcde5623a8ef0acc21a964819e08a5ad21c548b2484d9314c9b092d1315

        SHA512

        930dbde61723f1dd8df0087e22937e67cf2d445f7ae2abb0671c606dd574b857b3759a6c6db9389da681da91e3dfe2de5a997666f0b766f8e71b26c2e794ba54

      • C:\Windows\SysWOW64\eneivcsrwtirbmv.exe

        Filesize

        150KB

        MD5

        98986a35ffee12229db2cd5186457554

        SHA1

        b96cfcd202113caabb073d9e1044cfae4b39d53c

        SHA256

        871a3b218c4c0a6b5e98523ef9dc5e7b7378d79c232393ffcaab3a2c9ee314c8

        SHA512

        eb885527e48f8d23822edfe13cd2a85107d5a243165f35b330f59a8d09033e0fc5d36b0a8977d57dc0e14be486057c96c668eebaab7f49134690e2901de1d9dd

      • C:\Windows\SysWOW64\eneivcsrwtirbmv.exe

        Filesize

        257KB

        MD5

        66714b0c0129ae596890b9fc5818e9de

        SHA1

        76674efe8b31a3a3fb6c93d4ce839c55aeef80a0

        SHA256

        1eea35874da2876965cfb66483b691602b56e48667e2ae48560370a35a6e347f

        SHA512

        8ea349ac73e9a5f31a6d666f04cb0d24b6b10cf158874b2b71e57ad027e431e04ec8da2e49533c7de62cf6fec282586d30f8df44bfef68a07cb8f7bbb08f2594

      • C:\Windows\SysWOW64\gwrvlzmgtk.exe

        Filesize

        185KB

        MD5

        0299802049691e095ef1bdc5ce324c80

        SHA1

        824413c8dc7a378997fbd30586a8575025e72b8c

        SHA256

        0488951dd4b6947d7043580b8b8e2ceb5d5f8176cee15b22f7305a99cf762b79

        SHA512

        a0e0939d18ac6205a9a62f858b5ddafa69e374c191a89cc6944dcb8d0645a603ca9f364083c327f7fa605236b9bdfaffb475a5658f7fa7a44b6d1ba11cf48f7f

      • C:\Windows\SysWOW64\gwrvlzmgtk.exe

        Filesize

        175KB

        MD5

        97f8e7e354dde40ae465b97901e920aa

        SHA1

        ea4712a24eb48b623583cd47e21c4b7b6e09a12e

        SHA256

        5ff50e7fc1c24ffdfe16434a14dff22da2b8418ea6947462db0ff3ea6697ee1a

        SHA512

        0194a0525e35bb80657d189d5b629e6e73bf2c1930da1e817a240821c880cbae0f9dfaf57edd1b0af1f36ab5e646d0521ac5736af382eec91bd310455a161f4c

      • C:\Windows\mydoc.rtf

        Filesize

        223B

        MD5

        06604e5941c126e2e7be02c5cd9f62ec

        SHA1

        4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

        SHA256

        85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

        SHA512

        803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        60KB

        MD5

        475bc585039419711091a2d43505d94c

        SHA1

        660cc89c53d13c04c6dbb9851fa249f75c858c4e

        SHA256

        43770d51702ed00278dd7921c40017648506dbb0313582c7a8aa69ea1d288210

        SHA512

        318e8158ad5e3f0f222a8afc7fb6d6bc543f5180c7e53bf4e6bda25cda11bc54dc46741f2ecfd9a0f2e762a6f860ce0223b7ac98ee884595930555c378af9a3d

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        61KB

        MD5

        d8e75925d91a30d655952bd06dca55ef

        SHA1

        49e5ff5d54842acc8f889571333b83d96327b9d4

        SHA256

        7802879271936ed754a02e9da516f862f3dd5f78a1f578ebdaf51af775793eb0

        SHA512

        089612d8f7dd691e857037a34168f85aacc467b8c110316727911dcde9cb65777d60d439123e387d79dc0957b4d12f723908d7626790162d503d158264fe9f70

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        57KB

        MD5

        3a81bb7f89fff51fd80d1e9e1e60471f

        SHA1

        7c04e73b47855108f7cb0f1f8e76b71078d74158

        SHA256

        7afee2b09ec479879bca80da134ceff2df40ad8eff99ed5b1461e6b64e3c474e

        SHA512

        d8500626b99b14b8e441c88b9a8431db9188b5dea17610b1d5ff35a199195026f6c9961281e7c3a4babe8c88b1a949a03a42c6872e2eb0ec1761f65095f777cc

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        64KB

        MD5

        d76d22b81130bc9206c7c947d7a9ea5e

        SHA1

        5956e88a6ec7949ce5a350e21703307d855f34b1

        SHA256

        b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

        SHA512

        112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

      • memory/1272-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/1400-54-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-50-0x00007FFE9FC50000-0x00007FFE9FC60000-memory.dmp

        Filesize

        64KB

      • memory/1400-43-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-42-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-48-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-39-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-38-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-37-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-49-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-51-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-52-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-56-0x00007FFE9FC50000-0x00007FFE9FC60000-memory.dmp

        Filesize

        64KB

      • memory/1400-57-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-55-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-53-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-44-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-47-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-46-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-45-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-41-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-40-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-115-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-116-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-117-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-144-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-145-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-143-0x00007FFEE1D50000-0x00007FFEE1F45000-memory.dmp

        Filesize

        2.0MB

      • memory/1400-142-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-141-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-140-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB

      • memory/1400-139-0x00007FFEA1DD0000-0x00007FFEA1DE0000-memory.dmp

        Filesize

        64KB