Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 23:45

General

  • Target

    4424164cf11c9061ee426566ba7514b2.exe

  • Size

    512KB

  • MD5

    4424164cf11c9061ee426566ba7514b2

  • SHA1

    0471816e3226d9cd03637d525b4d44737b5b5b10

  • SHA256

    4e918bc4131a67cca71f8a2f871353bf356515ab18e62386e6d009e3fc0374ba

  • SHA512

    f5911ef066618ba3ac6aa3bc026d2d5de09add81a48251f768ccb73d430486d320f33d9bdc3e58035651f63a257c22d9e3845ec20ea730ec3f8f49ca84cb6609

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6L:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm52

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4424164cf11c9061ee426566ba7514b2.exe
    "C:\Users\Admin\AppData\Local\Temp\4424164cf11c9061ee426566ba7514b2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\SysWOW64\nhpqbuvyqr.exe
      nhpqbuvyqr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\wqnwyymo.exe
        C:\Windows\system32\wqnwyymo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5024
    • C:\Windows\SysWOW64\vhrjlksdoljrujp.exe
      vhrjlksdoljrujp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2120
    • C:\Windows\SysWOW64\wqnwyymo.exe
      wqnwyymo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4432
    • C:\Windows\SysWOW64\zgxgphnplcjxe.exe
      zgxgphnplcjxe.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4484
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e160e25738d5aa713b46c97a8c694693

    SHA1

    d861b543756a4927e731e6207f1e3e4384d86635

    SHA256

    b54dbb969aa771df29b58ff119babf6aad6a19d969dd0305590fd9ac7bf4e54f

    SHA512

    b4b4280d664e70dfc3b484c2bc5e9cb809fdeb91dbcbd398707b180edb7712ef1e69fad0aa583416b03d6d37cad7c69c7c2c61dc82f0649d81c26719749a3b71

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    fa6389f51a3d4c8f570958e507dad347

    SHA1

    949abe02754bd0cdc7ae659f17f727d8e00bbeff

    SHA256

    21c1dcb7a1a3ae67e5d40421e55a47b79ab1add83108d0d1940ff9386c1a11f9

    SHA512

    e7a80ecb665d280217942be2540ba90475354932f6927285cf3198f19e13fefbb28a57cb88a2567ea0e44d1b493385896f7f85d359c2a40e2d0f9c0b2a41369f

  • C:\Users\Admin\Documents\GroupEnter.doc.exe

    Filesize

    512KB

    MD5

    24e22fd17a9cea31040dca905e347d94

    SHA1

    ae618aeb09a2558ce7decbf5e4ae711407846ce4

    SHA256

    a9977e021d08f9445fd0667e64cd9cd69f04a95edbdf828611d7233a2b3dd8ff

    SHA512

    0079c3212d495ab1f9ca1c1139e6b5dac9091f79fae0810d1552241318d6c18c3ad5e194ac2cdf7d1b4807fa8716629f09b532f2d88196d56ebff5e5ff849197

  • C:\Windows\SysWOW64\nhpqbuvyqr.exe

    Filesize

    448KB

    MD5

    9728739f509ce0f3b3b073c945c208bf

    SHA1

    31bf207a650a7f1bbb8e90552891f1a6f4e4783b

    SHA256

    f252517c755af447fe73347dd23cd133e28c7a203d01382306a195c8ddda3dba

    SHA512

    76e963f4d1b88528ebbdbc375372889efffba4768f6a99bccce4c1faa730e9515f93fa74bd10bb61c0034f2ceb9ef85ee8234f9d13df183ffc7e163ae3dd38e7

  • C:\Windows\SysWOW64\nhpqbuvyqr.exe

    Filesize

    512KB

    MD5

    c20748c08b2cd1b1ae6fb4dbd7ba328f

    SHA1

    e59cba00323c2fc0fa35c19c4112f0ccb5010a36

    SHA256

    232dc6bd8d8608df7339dab28e710589138f62b6cca46a28a688a9cf7b3ad5a1

    SHA512

    873cd67ccf91dadb84584d41ea3cefa3fa65c7e38516f4e5a7b53ca2d8290be699dad39eab371f38d8a2c13adf278742f41c200b265b7cb6338ff57c39a2f39b

  • C:\Windows\SysWOW64\vhrjlksdoljrujp.exe

    Filesize

    128KB

    MD5

    33be84de0fa03c6883fec2ead970e3ba

    SHA1

    dbe35ed4343779aa93200c24966ccb805e18f223

    SHA256

    ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

    SHA512

    3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

  • C:\Windows\SysWOW64\vhrjlksdoljrujp.exe

    Filesize

    64KB

    MD5

    d76d22b81130bc9206c7c947d7a9ea5e

    SHA1

    5956e88a6ec7949ce5a350e21703307d855f34b1

    SHA256

    b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

    SHA512

    112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

  • C:\Windows\SysWOW64\vhrjlksdoljrujp.exe

    Filesize

    512KB

    MD5

    c5575ee0be4b7eaa9b27909f97b44c19

    SHA1

    ffdb03109fcb8936350671fafb283a97d8203bc5

    SHA256

    2972f6783a40bc5d6bc833302f785c3fd816d0b16a50cef9b630f32c28e54e61

    SHA512

    46b35eee087b9fa5f852cfaa6f0babc6e3e9716939bf8ae53fe23c40c22c60e340ebf34b01e63a4fbb21f449344aff878ff8539fd99b133589a74d149f70ddb9

  • C:\Windows\SysWOW64\wqnwyymo.exe

    Filesize

    512KB

    MD5

    fe1d6be2a5cd3be5e943e7c0e8efa175

    SHA1

    fee006e171eae53e7093c65ea865e9fc6cb0e4b3

    SHA256

    08b48c80ceaaef076aa775859566720ec013774bab835553c9b8662ca1cf1aa7

    SHA512

    bf30ceb98c5840a6b51e069945ec80357ec4a9cfb5d1ba57550ff94d41f4cd8b27ac8335f5c49389a30727155d40810d79dfd60fd513634eadd561aaca7618be

  • C:\Windows\SysWOW64\zgxgphnplcjxe.exe

    Filesize

    512KB

    MD5

    cb1ce413034dfcb4174c0d84c732d102

    SHA1

    4eb0b36d5ce4878fae39493feba746e665e28dfb

    SHA256

    d100e2efcac7cc7f05d3e6298cfb42c8b60164668a7df55285e627d5b5c4d86a

    SHA512

    826d5ee10c82d6720289a2d9ad0304860ea065a3c2978d455ffc14dbd0e9d67b466bb70f1772aaf042de1317fa1e5905476d681a9f53071a9a891b436f650075

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/1420-46-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-55-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-42-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/1420-43-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/1420-44-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-45-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-37-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/1420-47-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-48-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-49-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-50-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-51-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-53-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-41-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-56-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-54-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-52-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-57-0x00007FFCAE310000-0x00007FFCAE320000-memory.dmp

    Filesize

    64KB

  • memory/1420-58-0x00007FFCAE310000-0x00007FFCAE320000-memory.dmp

    Filesize

    64KB

  • memory/1420-40-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/1420-39-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/1420-38-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-101-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-102-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/1420-103-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/4952-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB