Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
0fc6146c753eb2f799f0dcdb920b0076.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fc6146c753eb2f799f0dcdb920b0076.exe
Resource
win10v2004-20231215-en
General
-
Target
0fc6146c753eb2f799f0dcdb920b0076.exe
-
Size
512KB
-
MD5
0fc6146c753eb2f799f0dcdb920b0076
-
SHA1
9022e455da04667f417fea82517ff8eb8929ef20
-
SHA256
baac8dd78ec97ae7e15bd328dd6540d3d6f64a101af3d1b4c59c2844f6cab944
-
SHA512
12ac8f8d8ec2bbf812153d33d38b6c0a301e041cd2b743c4d8f22281717276bac43652ba1d81972e323283cebce3aa05e2b151f280693f6d7d35b30564761026
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6V:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Y
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1504 gwrvlzmgtk.exe 3968 eneivcsrwtirbmv.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1272-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00060000000231f8-26.dat autoit_exe behavioral2/files/0x00060000000231f9-32.dat autoit_exe behavioral2/files/0x00060000000231f9-31.dat autoit_exe behavioral2/files/0x00060000000231f8-27.dat autoit_exe behavioral2/files/0x00060000000231f8-35.dat autoit_exe behavioral2/files/0x00080000000231f3-23.dat autoit_exe behavioral2/files/0x00080000000231f3-22.dat autoit_exe behavioral2/files/0x000f000000023124-19.dat autoit_exe behavioral2/files/0x000f000000023124-18.dat autoit_exe behavioral2/files/0x00080000000231f3-5.dat autoit_exe behavioral2/files/0x000600000002240b-89.dat autoit_exe behavioral2/files/0x0007000000023215-95.dat autoit_exe behavioral2/files/0x0007000000023215-93.dat autoit_exe behavioral2/files/0x0007000000023215-97.dat autoit_exe behavioral2/files/0x0007000000023215-98.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\eneivcsrwtirbmv.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File created C:\Windows\SysWOW64\eizuozcq.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File opened for modification C:\Windows\SysWOW64\eizuozcq.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File created C:\Windows\SysWOW64\ebjhgcgssqvbg.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File opened for modification C:\Windows\SysWOW64\ebjhgcgssqvbg.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File created C:\Windows\SysWOW64\gwrvlzmgtk.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File opened for modification C:\Windows\SysWOW64\gwrvlzmgtk.exe 0fc6146c753eb2f799f0dcdb920b0076.exe File created C:\Windows\SysWOW64\eneivcsrwtirbmv.exe 0fc6146c753eb2f799f0dcdb920b0076.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 0fc6146c753eb2f799f0dcdb920b0076.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442D7F9D5282596A3077A170542CD97CF364AD" 0fc6146c753eb2f799f0dcdb920b0076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFFABAF913F190840F3B4281983E93B38803F04361023BE1CC42ED09D3" 0fc6146c753eb2f799f0dcdb920b0076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB7B15844E4389853B8B9A732EFD4BC" 0fc6146c753eb2f799f0dcdb920b0076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF4FFFC482A85199146D75D7D92BCEEE631584666416345D7EA" 0fc6146c753eb2f799f0dcdb920b0076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0866BB8FF6D21DCD209D1A78A0B9160" 0fc6146c753eb2f799f0dcdb920b0076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC67D1591DAC3B8CF7CE5ED9537C9" 0fc6146c753eb2f799f0dcdb920b0076.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 0fc6146c753eb2f799f0dcdb920b0076.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1504 gwrvlzmgtk.exe 1504 gwrvlzmgtk.exe 1504 gwrvlzmgtk.exe 3968 eneivcsrwtirbmv.exe 3968 eneivcsrwtirbmv.exe 3968 eneivcsrwtirbmv.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 1504 gwrvlzmgtk.exe 1504 gwrvlzmgtk.exe 1504 gwrvlzmgtk.exe 3968 eneivcsrwtirbmv.exe 3968 eneivcsrwtirbmv.exe 3968 eneivcsrwtirbmv.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe 1280 eizuozcq.exe 1136 ebjhgcgssqvbg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1504 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 35 PID 1272 wrote to memory of 1504 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 35 PID 1272 wrote to memory of 1504 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 35 PID 1272 wrote to memory of 3968 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 34 PID 1272 wrote to memory of 3968 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 34 PID 1272 wrote to memory of 3968 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 34 PID 1272 wrote to memory of 1280 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 27 PID 1272 wrote to memory of 1280 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 27 PID 1272 wrote to memory of 1280 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 27 PID 1272 wrote to memory of 1136 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 33 PID 1272 wrote to memory of 1136 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 33 PID 1272 wrote to memory of 1136 1272 0fc6146c753eb2f799f0dcdb920b0076.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fc6146c753eb2f799f0dcdb920b0076.exe"C:\Users\Admin\AppData\Local\Temp\0fc6146c753eb2f799f0dcdb920b0076.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\eizuozcq.exeeizuozcq.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1280
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:1400
-
-
C:\Windows\SysWOW64\ebjhgcgssqvbg.exeebjhgcgssqvbg.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1136
-
-
C:\Windows\SysWOW64\eneivcsrwtirbmv.exeeneivcsrwtirbmv.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3968
-
-
C:\Windows\SysWOW64\gwrvlzmgtk.exegwrvlzmgtk.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1504
-
-
C:\Windows\SysWOW64\eizuozcq.exeC:\Windows\system32\eizuozcq.exe1⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239B
MD5be0da8bd0259e747ab4de49863441778
SHA1addb33f5fe47eda8a72ce0b5fdd2da0ca5921c23
SHA2560f5f777590611da5383b2152485610e4001b6d58b5849461942ba175f608be31
SHA512c301c8e08b7519678adac358f3ae557565be879255f8fc45c9c2692074d9bedc48c2441bcbd0d34075a488bd79b975eabee3a625d4cb570bdd38b452dc2985a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5c9dd1979da66b9b87d7884e32fbbb4d3
SHA180e7c40e4892796b0454198d3ca6befc0a0ddbb5
SHA256923a1824b80b573048ef1628fafe48983a8f956042c0c2cdab9d003a0b5640f7
SHA512be39c0d2232c815c885d920c0e27862e4201b15ea2393e7e4b8f62930f2dfaa7bdea3ec45c6540eaef6466fc7543f566f370b69d7a03efbc0b872c2f6b78c5f2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5e907a73737329a18a5d8caa742aad60b
SHA154e4f25a217de6a21022e8c340823aeca515edf2
SHA2566fedd23299a05d73338c0c352b40c89c057caa0a452878e7b50ef2dc849c4953
SHA512ee7882cdc91bf6ff0ca284be43e236ce98e7682a212abd14942ee75c1778f747d8c59c13ab10325cbcab074aa95cca76b4b88e19a280c0b61606b5b0f93aa711
-
Filesize
145KB
MD5a2aaf40bc7348f5841ae9c5ababff80b
SHA1a80acc0cf6bdf92b92dcaa7c5f336491a5014684
SHA2567ce24a3a3a198f7ff0e2df7b6972c3b55b10fc79ceda2001ab7aba82f948185c
SHA5123cd91a15b9c18edeb2e14e1d5c2f4608f8785bedadb22125713211aa6b68cfbd0fe3d5dabc24d360b18791ae4e2a126997d4b670296e3620c7d3f64a7a30db78
-
Filesize
22KB
MD520cb646c115f338fd6e44ecebc99d960
SHA1e2ea3518c18eba15b7b98bf60a095ea4a7e01d26
SHA256441f002b56c4b00b75ed7aa606cc3825427ec41e4bf70a9627b662849b6bf2a2
SHA512d6f8b3cce6d1b65d8edd917b0c3ec459ac30a9345a46c7f2ae4f81733a601fc09d102b3eeb610a12069da5ca70107e1c141a067b6da9fe6e8a856b9b105091b4
-
Filesize
60KB
MD5b41efc2b6394a9e85d9383a68696160d
SHA1eddb1ac0bbd0318e6bcff357596b993d08f1301a
SHA256c6694ef71601f2108b5c99ba931101a19c47ea45545695abe5a0016a065f12b4
SHA5123f715019b9d16ccb39d712661d5bc03a2e591a1ea4b903758ceae64b13f7ff39d8d66030701ecc06c3066f81f587c8abccce5636de95faa816d59ea830d38ad9
-
Filesize
32KB
MD5373bb9537dbfb3eee05d025f4a747bd4
SHA1d09b33b7a4b6a7d843b35ac4e90532748cebed9f
SHA256a957a2cfa2bd7581dcc7fcf6e15e8f09bc932505a8f940dd6f41cbf1192f7cfc
SHA512337b0132fc1d7ae39e35602b30fd9b88d98863f2275c5fc699a89d90559f917e5f7fbdbfd66e48ae103993754ef3e18e27ffba63e3c13f426d822ffce82b68c3
-
Filesize
12KB
MD54b6143930006d610dfb801443938b34f
SHA109a11758440d7f3c1f8519e4e4b40467fe71b36d
SHA2561e9be188d1365d50421e37def997f7ee6c4daca825e1ecac3804300c08005478
SHA512cecf9b0e236efedce75bfe9b21364fc21e760deaff9fcef3afb85dad435594b1587f5ca726062e7576ea11b913ee4a8a85ba328595b3344a471644d70ee68027
-
Filesize
111KB
MD59be9e0ffa44813e586c24930a17fb56a
SHA1bad6cec4cd3a780bf6270da2e87c04ae67710ce8
SHA25672dd05c7b59532acbf31867c753e49c703260eb7d01f04b1dabf73aad007df34
SHA512aae3d23b4b3db27c1238a81e851ee8e409a48b35a1736b35a649a3343a98a93e1e05996ac06c5ddb449517d17ce53412a301691576766d9ee6cf26a3993eb102
-
Filesize
146KB
MD52fb092fdcc7182954d53b7c3f13dfb5f
SHA142c82a3349d7f7c750f4aea3745e0183da43cbaa
SHA256a1cbabcde5623a8ef0acc21a964819e08a5ad21c548b2484d9314c9b092d1315
SHA512930dbde61723f1dd8df0087e22937e67cf2d445f7ae2abb0671c606dd574b857b3759a6c6db9389da681da91e3dfe2de5a997666f0b766f8e71b26c2e794ba54
-
Filesize
150KB
MD598986a35ffee12229db2cd5186457554
SHA1b96cfcd202113caabb073d9e1044cfae4b39d53c
SHA256871a3b218c4c0a6b5e98523ef9dc5e7b7378d79c232393ffcaab3a2c9ee314c8
SHA512eb885527e48f8d23822edfe13cd2a85107d5a243165f35b330f59a8d09033e0fc5d36b0a8977d57dc0e14be486057c96c668eebaab7f49134690e2901de1d9dd
-
Filesize
257KB
MD566714b0c0129ae596890b9fc5818e9de
SHA176674efe8b31a3a3fb6c93d4ce839c55aeef80a0
SHA2561eea35874da2876965cfb66483b691602b56e48667e2ae48560370a35a6e347f
SHA5128ea349ac73e9a5f31a6d666f04cb0d24b6b10cf158874b2b71e57ad027e431e04ec8da2e49533c7de62cf6fec282586d30f8df44bfef68a07cb8f7bbb08f2594
-
Filesize
185KB
MD50299802049691e095ef1bdc5ce324c80
SHA1824413c8dc7a378997fbd30586a8575025e72b8c
SHA2560488951dd4b6947d7043580b8b8e2ceb5d5f8176cee15b22f7305a99cf762b79
SHA512a0e0939d18ac6205a9a62f858b5ddafa69e374c191a89cc6944dcb8d0645a603ca9f364083c327f7fa605236b9bdfaffb475a5658f7fa7a44b6d1ba11cf48f7f
-
Filesize
175KB
MD597f8e7e354dde40ae465b97901e920aa
SHA1ea4712a24eb48b623583cd47e21c4b7b6e09a12e
SHA2565ff50e7fc1c24ffdfe16434a14dff22da2b8418ea6947462db0ff3ea6697ee1a
SHA5120194a0525e35bb80657d189d5b629e6e73bf2c1930da1e817a240821c880cbae0f9dfaf57edd1b0af1f36ab5e646d0521ac5736af382eec91bd310455a161f4c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
60KB
MD5475bc585039419711091a2d43505d94c
SHA1660cc89c53d13c04c6dbb9851fa249f75c858c4e
SHA25643770d51702ed00278dd7921c40017648506dbb0313582c7a8aa69ea1d288210
SHA512318e8158ad5e3f0f222a8afc7fb6d6bc543f5180c7e53bf4e6bda25cda11bc54dc46741f2ecfd9a0f2e762a6f860ce0223b7ac98ee884595930555c378af9a3d
-
Filesize
61KB
MD5d8e75925d91a30d655952bd06dca55ef
SHA149e5ff5d54842acc8f889571333b83d96327b9d4
SHA2567802879271936ed754a02e9da516f862f3dd5f78a1f578ebdaf51af775793eb0
SHA512089612d8f7dd691e857037a34168f85aacc467b8c110316727911dcde9cb65777d60d439123e387d79dc0957b4d12f723908d7626790162d503d158264fe9f70
-
Filesize
57KB
MD53a81bb7f89fff51fd80d1e9e1e60471f
SHA17c04e73b47855108f7cb0f1f8e76b71078d74158
SHA2567afee2b09ec479879bca80da134ceff2df40ad8eff99ed5b1461e6b64e3c474e
SHA512d8500626b99b14b8e441c88b9a8431db9188b5dea17610b1d5ff35a199195026f6c9961281e7c3a4babe8c88b1a949a03a42c6872e2eb0ec1761f65095f777cc
-
Filesize
64KB
MD5d76d22b81130bc9206c7c947d7a9ea5e
SHA15956e88a6ec7949ce5a350e21703307d855f34b1
SHA256b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870
SHA512112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1