Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 05:18

General

  • Target

    076a7a25450e61549269d16ae8852e54.exe

  • Size

    512KB

  • MD5

    076a7a25450e61549269d16ae8852e54

  • SHA1

    2ab3a5e83a3850884a34085d387634c6e800bad4

  • SHA256

    265b40bc475243edad303405c47d59a87f670bda0ff21b8672b2023afc2fcaaf

  • SHA512

    fc64b38306c574e53ecc632fc0fd7853c60fd36a1e481505438d622e595daa0bb4a7bf197f4bab870311ef0db16919e533641993a15cea3a55fe5947cd78010a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6O:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5D

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\076a7a25450e61549269d16ae8852e54.exe
    "C:\Users\Admin\AppData\Local\Temp\076a7a25450e61549269d16ae8852e54.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\SysWOW64\vgdjsgqrcn.exe
      vgdjsgqrcn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\SysWOW64\guohbrom.exe
        C:\Windows\system32\guohbrom.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4488
    • C:\Windows\SysWOW64\viiledjiamxnh.exe
      viiledjiamxnh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4064
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1468
    • C:\Windows\SysWOW64\guohbrom.exe
      guohbrom.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3756
    • C:\Windows\SysWOW64\zubuealhhzxtklh.exe
      zubuealhhzxtklh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\guohbrom.exe

    Filesize

    512KB

    MD5

    b187f5134763f5dfd33cfb8ac7a7174c

    SHA1

    ecb77713792291b9e9a59340c41703a3a44a3de1

    SHA256

    f2ff2ab78df12200c9ca5cd4d012d1ee5019c8494bb07685c8f1e8ecf493dc51

    SHA512

    f04655a890a722f37014951b3fd69dc35096a1e7b1f84294f518c32bb3151422405abe011f792e763f50f896d703838919194bdcb1058c578caf854f89901d0d

  • C:\Windows\SysWOW64\vgdjsgqrcn.exe

    Filesize

    512KB

    MD5

    2dbf728974b35d2468ba648b79475365

    SHA1

    c0360efb9ebc36443e6e919cd7c403a830a8ae61

    SHA256

    5b86038af670284025fa0da874b83d406ed2e97df6ec051ddef8f447647bd7a6

    SHA512

    1110c7958e1d9e296b68a877dc5ca081deec295fd47bb8a7b7dbc893990214d5f3458d04284a4fb719318a0e6dcf7bcd6245d82f3b43322a9361bbf3f33aa315

  • C:\Windows\SysWOW64\viiledjiamxnh.exe

    Filesize

    300KB

    MD5

    736c8d515f59132c6fd588c8ac266979

    SHA1

    74b85401d8cb50f266cbdce80a88fbfefe6d72e1

    SHA256

    44e4d8541b89efe4d73f560354d6b9ced87d16839aa4c47deec3d17813859ae1

    SHA512

    d7f805637f703c1ec6642c8be57ea24316c1bb7338ffc1bca13756ba1cfd6c79362556c5c8ad000155a7cd3197cc5a654b460fd9cf72926b8f4b9d2c13999df5

  • C:\Windows\SysWOW64\viiledjiamxnh.exe

    Filesize

    93KB

    MD5

    257f28bd5bdc2b725434b7ab570814e7

    SHA1

    972446e0f8d210c5d6f42a57a921391a236d564d

    SHA256

    d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

    SHA512

    c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

  • C:\Windows\SysWOW64\zubuealhhzxtklh.exe

    Filesize

    512KB

    MD5

    21b6535c7cf55550651a947e3ee23c15

    SHA1

    19d5a5a879df6616ca6c928d1713d7fbbf0f8160

    SHA256

    a290dde2bcc560c1cad9bb81b6f8310a34cce6fe8097352a9201055d5a4e772b

    SHA512

    9f502ff4c8adcc4c8418cd8d9bf624d2b4df624082bb8cf6a88ddfbfe45aa5f8027e7de2ddab96e9ecbf469ce5263fa47a98d95bfd426ff7476f07b8db53d609

  • memory/1468-53-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-47-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-44-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-46-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-43-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-48-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-52-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-55-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-57-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-59-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-58-0x00007FFE62390000-0x00007FFE623A0000-memory.dmp

    Filesize

    64KB

  • memory/1468-56-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-54-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-153-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-51-0x00007FFE62390000-0x00007FFE623A0000-memory.dmp

    Filesize

    64KB

  • memory/1468-50-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-49-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-42-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-41-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-38-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-39-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-37-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-35-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-36-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-125-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-126-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-130-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-152-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-157-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-156-0x00007FFEA4590000-0x00007FFEA4785000-memory.dmp

    Filesize

    2.0MB

  • memory/1468-155-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/1468-154-0x00007FFE64610000-0x00007FFE64620000-memory.dmp

    Filesize

    64KB

  • memory/2960-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB