Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 03:52

General

  • Target

    03fc9e8b77254aea88e4ee6874e6aa16.exe

  • Size

    512KB

  • MD5

    03fc9e8b77254aea88e4ee6874e6aa16

  • SHA1

    37ed01e12640426729ec3445035421cae398e9f3

  • SHA256

    67ae1cb8fb6f1617dfb89958e55245dc791d41f8e3b7af48b175543f243ee46e

  • SHA512

    31633112a32d70680d560e97b93994cdcf15e25973b6062558c1bad4100137e926e27742e4775b3f289464cb39b2314ba93e83895c4ac55fa8da5e0e22ac2f1a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj63:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5a

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03fc9e8b77254aea88e4ee6874e6aa16.exe
    "C:\Users\Admin\AppData\Local\Temp\03fc9e8b77254aea88e4ee6874e6aa16.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Windows\SysWOW64\zjffcnwkem.exe
      zjffcnwkem.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Windows\SysWOW64\ekneloim.exe
        C:\Windows\system32\ekneloim.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3844
    • C:\Windows\SysWOW64\hyeqxebzvnlente.exe
      hyeqxebzvnlente.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:68
    • C:\Windows\SysWOW64\vkvmvvjzpbaoh.exe
      vkvmvvjzpbaoh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4032
    • C:\Windows\SysWOW64\ekneloim.exe
      ekneloim.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1088
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    21KB

    MD5

    53f9850060b0fbbe381e006a78ff77c5

    SHA1

    5f86c8f08df3a266fd842363e1ecf79dc949aa4c

    SHA256

    ad045755c99ad17e8a70b84c99662985030f38d9789b93e94666a8588e5ae178

    SHA512

    f03403fac2ae32db4b53e0505c5e8d1e6061f6b66aa271c07deea27a467a4e777363a2e3d49153302113993b674508001effc9ce28512d999a1a78731ede0c62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    2319dc21d512fecbd3cbda76f3f219bb

    SHA1

    f96655a93e5eb1287f8ba6314645cce8e2c1246d

    SHA256

    a26d758300e14c9ea180c464183f98cf2dfde1fe5abfe943df8b07c840ffd9b5

    SHA512

    765a05dd93f126b93a1c611ce5cef769e96f2b9266246c78dbb270106d077fe59ceed9a2fe6832aeeef7e259ff2367475980660ad75d29bb99f8d8d5bda2cff1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    6b268a4c84dacb00a838581876c08cbd

    SHA1

    dc362a5100252a1ea55542cfde542bc557530367

    SHA256

    51a45a92db0b2474538beb4e715f99116fe380016c703f5d6e829507dd626abf

    SHA512

    6979ee62be46bd081198748c28e8d4f418b7ea3df463b71afd3d1f53f7167765568a7cc4564ef7b7871dee741daf8a1b9190e0e8006f885b48c7b5c7942f67c2

  • C:\Users\Admin\Documents\PublishConvert.doc.exe

    Filesize

    512KB

    MD5

    f678e2fbe41a12ec58d665eea92523d6

    SHA1

    30f1fdf07e183473bf733a661a8e6e6988103ce6

    SHA256

    00c9f9bbafb3d0347ff494accddae0223b699118feeb7be7055e9e2a610b645d

    SHA512

    35283e0562e711e2d2e5fa573ff3e0f4f552241740724841390fb57f0e8433337b290d65871656a5fc17c193d3a4a47a628fc0413ae6768885a1bd4efe09703c

  • C:\Windows\SysWOW64\ekneloim.exe

    Filesize

    207KB

    MD5

    5e252fb954da74e666096f526c656f68

    SHA1

    8ec6f525fc81853589e615736955ae90e52856c6

    SHA256

    b15477b09f910cdbcf5add73efaabbe6caf21d2a0b4ab6abb9a82551312230f3

    SHA512

    859f7abb527c3641cdea0a3aeb8500f953f9fbb38f236aeda9b71003622863c9c145b231d78c79dbd43841ae5d07689342ac6668b464d05d0f584c6266680c49

  • C:\Windows\SysWOW64\ekneloim.exe

    Filesize

    256KB

    MD5

    f6d822896cbe425540368c1aba8a8952

    SHA1

    3f43aa4c5e94ab717ef73032b62af1fb54141e57

    SHA256

    61dcf6e7680a764308623c9923dbfdeddc59f0298d392ef565861a42cfe39e0e

    SHA512

    6bddfed443dd9b84dfd9a50ae509493e24abc4408659b5bfdb3f71f991d1249ad045ced6b734d5c0cee298d4deb4ea9d833d7cd83a90330d835b56c7640dadcf

  • C:\Windows\SysWOW64\ekneloim.exe

    Filesize

    512KB

    MD5

    a353eeac06d130f3c97655fa8b60f4b8

    SHA1

    870f499c6a419c9e1603ea166c9fa0ea2d8859ed

    SHA256

    f4216e1e245aca967307d51e6e487b0eec642dabea0f7e3675810434c83c1567

    SHA512

    f78b138a4d1f2f78bc048615e14789a425296518d500a42a36d7100fa8c7c6e041b89ae4073e903a8db8ec31c21e07fdfa32dc352311166d34968bc3dff34635

  • C:\Windows\SysWOW64\hyeqxebzvnlente.exe

    Filesize

    395KB

    MD5

    29888121410347065fa1b95f4090e5ed

    SHA1

    9f0093ee68e035abd4dfc9d1c3241dabb4e1a9eb

    SHA256

    ec71fb230f332c1853e69b245781072e3e37be568f82ed4343f4f88ba33323dc

    SHA512

    5f406d2d22d826a91f7926455be7fa92b6536eeddfa8e9c059cca78d21696eedbb40a27320c2b99c60fb7d4a58d45ca859bfcca1d6d09e90a8687b96f062f962

  • C:\Windows\SysWOW64\hyeqxebzvnlente.exe

    Filesize

    512KB

    MD5

    f926c901bc5487ca1000cae79b05dd7b

    SHA1

    8016a3e9cd95e4843ad96650179cf433d550e467

    SHA256

    283205d962120b98e79768ef43d6a36ad83145ea0a6878a7cfbd0f56d67d16e4

    SHA512

    0b82094c4cf0f9b710c47d85021a3f7a2c1c3d2fc652b9d6bea497f423ee972132eefc8c90f8b736037bf8bb9975c36479386ba236977e8e373c1209ef02755f

  • C:\Windows\SysWOW64\vkvmvvjzpbaoh.exe

    Filesize

    258KB

    MD5

    653d225fefa48925e915f0126dedd713

    SHA1

    fd75c896c9a5b52d8a4b9f895de02c157f7a1ae5

    SHA256

    f8debdbd4f89e3cd745846587019b85060608f1c1e5f9ffab64418a9e76ffeca

    SHA512

    824ac032c29743f0da58ff8b55ce7c741b2d2a3f2a70780671f7099d27595b30e2e84009eda5d404ba27b1c2b535a50de0ec2ec9d343073e44117ebfbd965ff2

  • C:\Windows\SysWOW64\vkvmvvjzpbaoh.exe

    Filesize

    178KB

    MD5

    9ab454d70803d9f7a58a1c06eb2f7ed0

    SHA1

    52ee1a8e0910036d89cd2ea1ddbe60fe476e4d96

    SHA256

    b47158427a760ba4521030d0bb8e19e8b854ba9e969e50b96276f59fd9aaff03

    SHA512

    1d2db5cb3f856b8f5ef231be72a4026f661942b70fd49525b4757d3fd47180f29e1aa92464d7a05e9781a2a82c6da0634299c6b431c1412bc2e7af6631067420

  • C:\Windows\SysWOW64\zjffcnwkem.exe

    Filesize

    512KB

    MD5

    5bd75c7107c4e670761747e16ca512ba

    SHA1

    88e98541d3802d293e05810b3b8b6d93a12b6f27

    SHA256

    7e3dd0d1fd0acff075ed0a98afb7c4077514ed807f0f605e7632c1b49184ecb2

    SHA512

    cb24dd10c4e129315573b8f30a9f2da671ee7fe310059f3349426a3a2235f4d995d40cb9440fd64047f9cafefb6a5e30bf1b6b4ab2868f39f7f826b0c4effcac

  • C:\Windows\SysWOW64\zjffcnwkem.exe

    Filesize

    471KB

    MD5

    ee33ab8b7fa8c9bc89340967450a6dd9

    SHA1

    96a181e4da5e49d60d82df6af8f80fc14b975aba

    SHA256

    1bff5bb306a4a34e2039c90b65c3c140793b480e6ae2353f994ddba0a54bf229

    SHA512

    a73cffd68279999bc35189c7e65977de4a844a4bafd31c5f80ff21331575b38b93498a7659470b07512c74a010847953030ceb5ef46b56ffd68a45489bc68550

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    87B

    MD5

    8b24f488bf5666fadf8b2bc3f34a876a

    SHA1

    0b7f7838db56d7110bb5376d467ebc176830a797

    SHA256

    458f18531d1ef64720f4b71956a8a747e59e466ce5a2de46497dcad2211a9080

    SHA512

    807e0d2e6a24ebe101b1fa26a24744e9375880090b2b694d84f5e62da23bf482f73ac78bf90be9b89a869d641f4c7a7ee69fe96fe023e230d6f644f46bd0adbd

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a4524992e8ec80618dadaf27457f25f9

    SHA1

    c8f73c3bfb96a829900afadf7cc983c07e31c8f8

    SHA256

    6f6c7239f242730946de6308d3ae92ebb47e35cb65b051ca4101d034e4b2df2e

    SHA512

    c094dfff72f29fbf2dc80ab29902eb6b15145b43bc88fe9cc1c5fb6a5c47e0111b5de2518d61acb8f8e91877822719c45ef5c1514429ce1d621055cff9cf01ab

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    9d20e670ba4ebc03623475c4eeca5810

    SHA1

    18042149fe6d9d4f12850a8f36a9b4da5fdf44da

    SHA256

    ba4ddddce7de0b019c6864f312e8c4584b3f0abd7dc7919779e28ceef81a1e4f

    SHA512

    c45eb858414308f18a1f8f3614c53ec1da2223b5af56560cd383a120d30a547a817203f6c36d3966a803ca7cd20777c6189d72db5e9b3fa7fe01640dcf6cfe7d

  • memory/868-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1632-38-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-41-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-47-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-48-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-53-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-54-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-55-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-56-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-59-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-58-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-57-0x00007FFB87030000-0x00007FFB87040000-memory.dmp

    Filesize

    64KB

  • memory/1632-60-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-61-0x00007FFB87030000-0x00007FFB87040000-memory.dmp

    Filesize

    64KB

  • memory/1632-46-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-43-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-45-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-39-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-40-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-37-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-109-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-110-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-36-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-35-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-151-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-152-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-153-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-154-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1632-155-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1632-156-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB