Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0fb00f611a03137f8ba7e6181eabcdd8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fb00f611a03137f8ba7e6181eabcdd8.exe
Resource
win10v2004-20231215-en
General
-
Target
0fb00f611a03137f8ba7e6181eabcdd8.exe
-
Size
512KB
-
MD5
0fb00f611a03137f8ba7e6181eabcdd8
-
SHA1
2d208cdf61eb7c960a08115acea97b9c48c24ee3
-
SHA256
3d968a0cf03136ed2f0393ca793437ea34b9f042b5eeb4e5d4a100ec1627b8f8
-
SHA512
6b6e4dd0a9bf9550b9fc5d2348f424e081f7634949b368504a94aef3b47f32c36838f642f448a1c9023d3c560d713f65e2ebfe9722e6e2c972961e28a0272d2f
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6J:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm56
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" todplwqdim.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" todplwqdim.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" todplwqdim.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" todplwqdim.exe -
Executes dropped EXE 4 IoCs
pid Process 1604 todplwqdim.exe 536 fykzhlexupzxplc.exe 940 xmdbteha.exe 560 nuurqznttkfmb.exe -
Loads dropped DLL 5 IoCs
pid Process 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 832 cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" todplwqdim.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vdnmrgvb = "todplwqdim.exe" fykzhlexupzxplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mjunnofp = "fykzhlexupzxplc.exe" fykzhlexupzxplc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "nuurqznttkfmb.exe" fykzhlexupzxplc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" todplwqdim.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" todplwqdim.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1620-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000800000000b529-17.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fykzhlexupzxplc.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File created C:\Windows\SysWOW64\xmdbteha.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File opened for modification C:\Windows\SysWOW64\xmdbteha.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File created C:\Windows\SysWOW64\nuurqznttkfmb.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File opened for modification C:\Windows\SysWOW64\nuurqznttkfmb.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File created C:\Windows\SysWOW64\todplwqdim.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File opened for modification C:\Windows\SysWOW64\todplwqdim.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe File created C:\Windows\SysWOW64\fykzhlexupzxplc.exe 0fb00f611a03137f8ba7e6181eabcdd8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 0fb00f611a03137f8ba7e6181eabcdd8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472C779C2D82246A3077D777272CDA7D8764AF" 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" todplwqdim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat todplwqdim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf todplwqdim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh todplwqdim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc todplwqdim.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACAF9BDF966F29383783B36869E3E99B38A038D42620248E2CE42EC08A9" 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B15C4795399952CABAD7329DD7BC" 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFFFC824F5C82139040D62D7DE2BC90E636593567416333D7ED" 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F76BB1FE6A21ACD172D0A98B7F9113" 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC67B14E7DAB5B8CA7C90EDE337C9" 0fb00f611a03137f8ba7e6181eabcdd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" todplwqdim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" todplwqdim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" todplwqdim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" todplwqdim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs todplwqdim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" todplwqdim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg todplwqdim.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 1604 todplwqdim.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 940 xmdbteha.exe 940 xmdbteha.exe 940 xmdbteha.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 1604 todplwqdim.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 536 fykzhlexupzxplc.exe 940 xmdbteha.exe 940 xmdbteha.exe 940 xmdbteha.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1604 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 27 PID 1620 wrote to memory of 1604 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 27 PID 1620 wrote to memory of 1604 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 27 PID 1620 wrote to memory of 1604 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 27 PID 1620 wrote to memory of 536 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 17 PID 1620 wrote to memory of 536 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 17 PID 1620 wrote to memory of 536 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 17 PID 1620 wrote to memory of 536 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 17 PID 1620 wrote to memory of 940 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 26 PID 1620 wrote to memory of 940 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 26 PID 1620 wrote to memory of 940 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 26 PID 1620 wrote to memory of 940 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 26 PID 536 wrote to memory of 832 536 fykzhlexupzxplc.exe 25 PID 536 wrote to memory of 832 536 fykzhlexupzxplc.exe 25 PID 536 wrote to memory of 832 536 fykzhlexupzxplc.exe 25 PID 536 wrote to memory of 832 536 fykzhlexupzxplc.exe 25 PID 1620 wrote to memory of 560 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 22 PID 1620 wrote to memory of 560 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 22 PID 1620 wrote to memory of 560 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 22 PID 1620 wrote to memory of 560 1620 0fb00f611a03137f8ba7e6181eabcdd8.exe 22 PID 832 wrote to memory of 2136 832 cmd.exe 20 PID 832 wrote to memory of 2136 832 cmd.exe 20 PID 832 wrote to memory of 2136 832 cmd.exe 20 PID 832 wrote to memory of 2136 832 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fb00f611a03137f8ba7e6181eabcdd8.exe"C:\Users\Admin\AppData\Local\Temp\0fb00f611a03137f8ba7e6181eabcdd8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\fykzhlexupzxplc.exefykzhlexupzxplc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.execmd.exe /c nuurqznttkfmb.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵PID:2964
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1728
-
-
-
C:\Windows\SysWOW64\nuurqznttkfmb.exenuurqznttkfmb.exe2⤵
- Executes dropped EXE
PID:560
-
-
C:\Windows\SysWOW64\xmdbteha.exexmdbteha.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:940
-
-
C:\Windows\SysWOW64\todplwqdim.exetodplwqdim.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1604
-
-
C:\Windows\SysWOW64\xmdbteha.exeC:\Windows\system32\xmdbteha.exe1⤵PID:2668
-
C:\Windows\SysWOW64\nuurqznttkfmb.exenuurqznttkfmb.exe1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5ffb14cfa960f704f9e8c60e2e4eb72c5
SHA13750c2377d6c33c83f3234e24420af785c3e938e
SHA25636c58c65055dc97c93b524b40306b4622a0a8a1e16bebca813aee90b9c19a578
SHA5122d97f47c2e58c8c659d3f9f5b2917d680c48b8d325882619544cdf58ce8668780ef6d306de7a8553edf5e258e0d598f715b7e43f51287ddfae8bb077f1ba971c
-
Filesize
93KB
MD5257f28bd5bdc2b725434b7ab570814e7
SHA1972446e0f8d210c5d6f42a57a921391a236d564d
SHA256d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688
SHA512c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575