Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 06:23

General

  • Target

    0b5eb14018d8edcf7ec2f0d53343cae0.exe

  • Size

    512KB

  • MD5

    0b5eb14018d8edcf7ec2f0d53343cae0

  • SHA1

    633b0af602f95b9839c78272b1f3dfa442a73b9a

  • SHA256

    645cc40b8227591e5c7c26f8f7877d47b80504d6437540131712d2fb26ff8ad2

  • SHA512

    1741449faa798cce64d6e6234602d8d815495b4baf2855c7e4e577567d980c8ec478cbdc823b3365fca97f33125123ec65a2603d15889b4871d54fd2b87405fa

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b5eb14018d8edcf7ec2f0d53343cae0.exe
    "C:\Users\Admin\AppData\Local\Temp\0b5eb14018d8edcf7ec2f0d53343cae0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Windows\SysWOW64\dpmbcogula.exe
      dpmbcogula.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\idemkovj.exe
        C:\Windows\system32\idemkovj.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4048
    • C:\Windows\SysWOW64\idemkovj.exe
      idemkovj.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3156
    • C:\Windows\SysWOW64\sgltvmxyrqabw.exe
      sgltvmxyrqabw.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4864
    • C:\Windows\SysWOW64\izdcisapodtabex.exe
      izdcisapodtabex.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1616
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    54744f4eca5a5d6d826891b4586898fb

    SHA1

    486cab95c4469d035e66cec4a5a07290128f6162

    SHA256

    d9803a1031485a164edde155c025565356731984f4a28f6c0f8e162bb8025b82

    SHA512

    b8a391f76b905e7cdb63fe2941d4f2914c36ac8322ff758095818ebd050aeb063582c665fc0d39b32760640e368daa92fbee2412fd70db1843c1a32c6ad2c3be

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e14ec3e60144186b37a6f8d337b3aacf

    SHA1

    5f4588ed4673d3f8f691e38562ff1ce6d4f23216

    SHA256

    3999d7da36630fae5b05439e1e19f8afcf89b6d549a5ab3e4ee3a6223a131626

    SHA512

    067be6d9df0c45627e550eccc123e56c7f62b2797923d89dd369b84a077fbf48d9c489067f669774f6b03df03c6f2566196120cce22959c163580f46f165cfc9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    6b43301db0a8c9e93d1e9bd0970e7438

    SHA1

    65cfd31b7c8c98fff0c40640cee0ffa222bd6d96

    SHA256

    c6e38bf4973ca852f208ececeaf294d9de931d4661e8c0245a3d1b11727a0595

    SHA512

    fafc43b996b649b4783f1ed9b5a52f4f4a8f463b4c338c00630cde69d8393c81f65b96e0af384c75f58523cf3f44aa1c2140b4199c020322eb6de0d49c6c348f

  • C:\Windows\SysWOW64\dpmbcogula.exe

    Filesize

    512KB

    MD5

    0c9a658ae6499f5ff21b0b0ca18bae0d

    SHA1

    49ac388cc8a56b0321f92aa948dd7e258a06bd9a

    SHA256

    c9524e38c7a5d96d41a4154d99a3c1fc03c33b1d090ab53e56c63658edde7b5b

    SHA512

    7e9a8e5b43b5e445bc308c881bf981bc67bbeb20eb3bbb063050e3b1f4cd22d882609dbd33cb698b444cc734b345e4b47919daa3fe21d5e10d77fb2439b5740d

  • C:\Windows\SysWOW64\idemkovj.exe

    Filesize

    512KB

    MD5

    a0df41f67dfffe7adebc34115e71fc1d

    SHA1

    88a29664908047377b6623d43e241af10a180065

    SHA256

    82f06e072123f47d7a70de06ff8252921254977cadb225411004db48bd06016c

    SHA512

    4fd84e549d9a2f373da538e82dcb145d8a4e4fe64010eacb6179f522d5ce1e55bfaa375c015d3e990bd398c587c67ffb049ac762f277204dada8d6c865b15386

  • C:\Windows\SysWOW64\izdcisapodtabex.exe

    Filesize

    512KB

    MD5

    d97627cf1538a7055ff3ee892e203241

    SHA1

    d371c8061453c55f69c6198f32ee30efb75da724

    SHA256

    b6adf24c18a0244f810be09e92eac8821b96b60117ef876004c8c8d273ae1942

    SHA512

    930e8a2f500327ee0d76b2d55b98c7c02936f0d15055be6280d6365cb7a0c34ca66ac2fc002746c2e79112dbea14571afbd8ff6a7e5a15ccd975c677a5849fe6

  • C:\Windows\SysWOW64\sgltvmxyrqabw.exe

    Filesize

    512KB

    MD5

    6eac1ee082522fb65200004427a8d369

    SHA1

    932df23327f9565f5ad4c46eac1a4183599e438d

    SHA256

    bf40f623afc0f7747ce3477e8f0e12b18b8d28d82ba5654cca3e487f4b1b10b3

    SHA512

    db9ad181a2a954e288e7ac33a0b2e370d0408f1ecbe43d34d526f096032db3880c8a8dc2a60f4266448644fa7b5ce94311683449ad7e358d56acf834daf1bbe0

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    9ab88db4521cf94b0989c515c12fb77d

    SHA1

    4457bc30d46ecdd92e1d9ee4e0688d0cee1dbfe8

    SHA256

    6ee0995574316aaddeccca471c02f08e0d712257f6f7767a2af5a1d6a2b1b84f

    SHA512

    d4674b1bbcdc3cc853f617ccaa52dc04701413d8c52c286e47903cac106d764196e9c7286b55397c55686229b089a1a67f8035ab3788068ac11efb03cef740f2

  • memory/2544-53-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-40-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-42-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-43-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-45-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-47-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-48-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-49-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-50-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-52-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-136-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-51-0x00007FFCA45B0000-0x00007FFCA45C0000-memory.dmp

    Filesize

    64KB

  • memory/2544-54-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-55-0x00007FFCA45B0000-0x00007FFCA45C0000-memory.dmp

    Filesize

    64KB

  • memory/2544-38-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-41-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-39-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-36-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-37-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-35-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-101-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-105-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-106-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-128-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-129-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-131-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-130-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-133-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-132-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2544-134-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2544-135-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB