Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 07:42

General

  • Target

    0fb00f611a03137f8ba7e6181eabcdd8.exe

  • Size

    512KB

  • MD5

    0fb00f611a03137f8ba7e6181eabcdd8

  • SHA1

    2d208cdf61eb7c960a08115acea97b9c48c24ee3

  • SHA256

    3d968a0cf03136ed2f0393ca793437ea34b9f042b5eeb4e5d4a100ec1627b8f8

  • SHA512

    6b6e4dd0a9bf9550b9fc5d2348f424e081f7634949b368504a94aef3b47f32c36838f642f448a1c9023d3c560d713f65e2ebfe9722e6e2c972961e28a0272d2f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6J:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm56

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fb00f611a03137f8ba7e6181eabcdd8.exe
    "C:\Users\Admin\AppData\Local\Temp\0fb00f611a03137f8ba7e6181eabcdd8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\fykzhlexupzxplc.exe
      fykzhlexupzxplc.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c nuurqznttkfmb.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:832
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
        PID:2964
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:1728
        • C:\Windows\SysWOW64\nuurqznttkfmb.exe
          nuurqznttkfmb.exe
          2⤵
          • Executes dropped EXE
          PID:560
        • C:\Windows\SysWOW64\xmdbteha.exe
          xmdbteha.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:940
        • C:\Windows\SysWOW64\todplwqdim.exe
          todplwqdim.exe
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Windows security bypass
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Windows security modification
          • Modifies WinLogon
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1604
      • C:\Windows\SysWOW64\xmdbteha.exe
        C:\Windows\system32\xmdbteha.exe
        1⤵
          PID:2668
        • C:\Windows\SysWOW64\nuurqznttkfmb.exe
          nuurqznttkfmb.exe
          1⤵
            PID:2136

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            ffb14cfa960f704f9e8c60e2e4eb72c5

            SHA1

            3750c2377d6c33c83f3234e24420af785c3e938e

            SHA256

            36c58c65055dc97c93b524b40306b4622a0a8a1e16bebca813aee90b9c19a578

            SHA512

            2d97f47c2e58c8c659d3f9f5b2917d680c48b8d325882619544cdf58ce8668780ef6d306de7a8553edf5e258e0d598f715b7e43f51287ddfae8bb077f1ba971c

          • \Windows\SysWOW64\todplwqdim.exe

            Filesize

            93KB

            MD5

            257f28bd5bdc2b725434b7ab570814e7

            SHA1

            972446e0f8d210c5d6f42a57a921391a236d564d

            SHA256

            d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

            SHA512

            c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

          • memory/1620-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/2964-48-0x000000002FA21000-0x000000002FA22000-memory.dmp

            Filesize

            4KB

          • memory/2964-50-0x0000000070D4D000-0x0000000070D58000-memory.dmp

            Filesize

            44KB

          • memory/2964-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2964-80-0x0000000070D4D000-0x0000000070D58000-memory.dmp

            Filesize

            44KB

          • memory/2964-101-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB