Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    8s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 15:16

General

  • Target

    28994693ade9db70de17977833dff062.exe

  • Size

    361KB

  • MD5

    28994693ade9db70de17977833dff062

  • SHA1

    385c53253f7e3f2727964633b11181612ac8607d

  • SHA256

    34cc21fabd4a36d41d9e459c4cf44bd1eb25c4f9e51218b0541af651d2af1727

  • SHA512

    f8f1a6d6daadfdc0ee03bbc171ab362c891dd21ac391f66bf9e4b49bbb229c4eccada6a7294bd622fdab071c01059379074c89de21fe48c91fbfa30c575287f2

  • SSDEEP

    6144:HflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:HflfAsiVGjSGecvX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 4 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28994693ade9db70de17977833dff062.exe
    "C:\Users\Admin\AppData\Local\Temp\28994693ade9db70de17977833dff062.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2136
    • C:\Temp\ytrlgdyvqkidavpn.exe
      C:\Temp\ytrlgdyvqkidavpn.exe run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:296
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\fzxspkecwu.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2580
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_fzxspkecwu.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2276
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\pkecwuojhb.exe ups_run
        3⤵
          PID:1852
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\i_pkecwuojhb.exe ups_ins
          3⤵
            PID:1356
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\Temp\hbzurmgeyw.exe ups_run
            3⤵
              PID:1520
            • C:\temp\CreateProcess.exe
              C:\temp\CreateProcess.exe C:\Temp\i_hbzurmgeyw.exe ups_ins
              3⤵
                PID:2812
              • C:\temp\CreateProcess.exe
                C:\temp\CreateProcess.exe C:\Temp\hbzuomgeyt.exe ups_run
                3⤵
                  PID:1872
                • C:\temp\CreateProcess.exe
                  C:\temp\CreateProcess.exe C:\Temp\i_hbzuomgeyt.exe ups_ins
                  3⤵
                    PID:692
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 296 -s 212
                    3⤵
                    • Program crash
                    PID:2064
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:2
                1⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2780
              • C:\windows\system32\ipconfig.exe
                C:\windows\system32\ipconfig.exe /release
                1⤵
                • Gathers network information
                PID:2632
              • C:\temp\CreateProcess.exe
                C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                1⤵
                • Executes dropped EXE
                PID:2596
              • C:\Temp\fzxspkecwu.exe
                C:\Temp\fzxspkecwu.exe ups_run
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2564
              • C:\Temp\i_fzxspkecwu.exe
                C:\Temp\i_fzxspkecwu.exe ups_ins
                1⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1952
              • C:\windows\system32\ipconfig.exe
                C:\windows\system32\ipconfig.exe /release
                1⤵
                • Gathers network information
                PID:2908
              • C:\temp\CreateProcess.exe
                C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                1⤵
                  PID:2040
                • C:\Temp\pkecwuojhb.exe
                  C:\Temp\pkecwuojhb.exe ups_run
                  1⤵
                    PID:2020
                  • C:\Temp\i_pkecwuojhb.exe
                    C:\Temp\i_pkecwuojhb.exe ups_ins
                    1⤵
                      PID:2828
                    • C:\windows\system32\ipconfig.exe
                      C:\windows\system32\ipconfig.exe /release
                      1⤵
                      • Gathers network information
                      PID:2608
                    • C:\temp\CreateProcess.exe
                      C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                      1⤵
                        PID:2556
                      • C:\Temp\hbzurmgeyw.exe
                        C:\Temp\hbzurmgeyw.exe ups_run
                        1⤵
                          PID:3012
                        • C:\Temp\i_hbzurmgeyw.exe
                          C:\Temp\i_hbzurmgeyw.exe ups_ins
                          1⤵
                            PID:700
                          • C:\windows\system32\ipconfig.exe
                            C:\windows\system32\ipconfig.exe /release
                            1⤵
                            • Gathers network information
                            PID:956
                          • C:\temp\CreateProcess.exe
                            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                            1⤵
                              PID:1868
                            • C:\Temp\hbzuomgeyt.exe
                              C:\Temp\hbzuomgeyt.exe ups_run
                              1⤵
                                PID:1800
                              • C:\Temp\i_hbzuomgeyt.exe
                                C:\Temp\i_hbzuomgeyt.exe ups_ins
                                1⤵
                                  PID:2320

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Temp\fzxspkecwu.exe

                                  Filesize

                                  93KB

                                  MD5

                                  18d4c2cd0f1a96ae1d4e13b9c4796c72

                                  SHA1

                                  d196306e5ed9d51a3c8600086ca7b0932925d538

                                  SHA256

                                  5295272751e8556ea0b149e114f7cbcab631bc3e02b3ec967330e2f46de1d96d

                                  SHA512

                                  90e8c116cd4bd14ea9e6f591b3ac6c6a084f2a813c62337d1c7373c9beb3a5811aae58c221800edd95d9659dcd09b509c463fde30e9fe889b6660a26d4a63f96

                                • C:\Temp\hbzuomgeyt.exe

                                  Filesize

                                  92KB

                                  MD5

                                  17f19384bca3ee7adaf41369f9ce7079

                                  SHA1

                                  d425f2f9e32c15e33696fe887f3295690c2ec548

                                  SHA256

                                  c3957c905fa621c10d3ad7037f17175f139cb43220d3ed087e932a81e12f3b97

                                  SHA512

                                  fffda39bd8472efc0da3688655e8ffd396896f6686f3eae69af8fc1327194270de13d02b82cdf30067c411000260632313a78568f02c48b2d8fb7eca25a79e00

                                • C:\Temp\hbzurmgeyw.exe

                                  Filesize

                                  352KB

                                  MD5

                                  7c7ac55d88b2fae37f357ee7957592db

                                  SHA1

                                  8f8b8f7922da55eb012c9029cb70b1eeff6b9a7b

                                  SHA256

                                  bcecd9372312bbc9832e25d05f6c21231fb85deba239c85a969f87462c990b19

                                  SHA512

                                  a40bd8c6e9ea543b84cca11cfc215f32b4ad3453a3fbba12e9a0a3bb7e8b04323cbbf769c04c2c5f1a11f791b7aaedd7c18406d37e402d367632c897906e6a01

                                • C:\Temp\i_fzxspkecwu.exe

                                  Filesize

                                  361KB

                                  MD5

                                  970c0377e0dcb9f8c36fd4f2dc054ee8

                                  SHA1

                                  f423655efc7cf4231ac5207aca976de8cfa4cc63

                                  SHA256

                                  a309750dce06f7801fb25c73965122eca5e6ad7ed2765a9ec3a4787ceb0cefb9

                                  SHA512

                                  493a249dde67bcf863cba388e205473150a4faca3684d61cf3b683f12bf7fd3084e60462399ab8a62a9e6b4800023346391d85eaf10332857afef0dc132a98ef

                                • C:\Temp\i_hbzuomgeyt.exe

                                  Filesize

                                  361KB

                                  MD5

                                  15c74d8ddf37eaa029eb1a5fd9c8d66f

                                  SHA1

                                  a52993002a6fe96829a932af8410f5bb154ed97e

                                  SHA256

                                  be06310ff3fa65ed5a16430ac039f26576dec21d547077d1ac532cbdc15eafb1

                                  SHA512

                                  24385a13eacbed68cee3e6f6f206afbe9dcb51df576ad982f956449a7a800aba5a6329590bbf658175dcfe406f54d766fac25bf03e4dfeba958e4c40d119320e

                                • C:\Temp\i_hbzurmgeyw.exe

                                  Filesize

                                  361KB

                                  MD5

                                  51876912020fca185d042c20b5458565

                                  SHA1

                                  5e23f40f372974ff4a3b844f275263ecbfd74fe8

                                  SHA256

                                  a6d18ede2307d2b645874a2132b7dc03f4b07ee977c89d7af5abfe150eeffa57

                                  SHA512

                                  7c85abe5c7f4b2f901f4cc03aa6b74a3a44d6840fadb58b63d7a6d47ba39dcbabb4aac212bcecd3166ef5430662e40427a3a3b7127770b6dcbc9548c224ccf0b

                                • C:\Temp\ytrlgdyvqkidavpn.exe

                                  Filesize

                                  361KB

                                  MD5

                                  69d22d6f36262104d31c0271f12f6bc4

                                  SHA1

                                  0fa56f7ad945e221d31113b864461334bf5f394f

                                  SHA256

                                  1043d787429109ebd13da7287f9113a7919b153a06aebf61c94f2030d56282c7

                                  SHA512

                                  697896a9fe228879650e7921ce0441379f654cd9246bddf9e5b4ac6854510e7815210e9cf2b64354bf254747759dabdd06685da6c2f02a38af8383236746c284

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  2cc294b56f890d64b6952a1cdd75bc09

                                  SHA1

                                  2c96ed4f616e749b2a6f7f73f70a80a127877345

                                  SHA256

                                  37f102322647960b028c731cdef4c29b98701548c352dc68621fac64749473a6

                                  SHA512

                                  ef134c6af4f09e1542dbb181e8a213e315ddef010d9487d6f1d011d4c7c1740a6ef8bdade11cbaafc5962b6bad47e561bd17d9c939c87af85072054aaad743b9

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  6c44a9997f133647be9923ddb102aec8

                                  SHA1

                                  afed2819b0bbd8a977dfbd4182db8f349747626f

                                  SHA256

                                  a2ef81c5d5157f1a6731066c26b58f40a2755bf19e45c3c38487c5df926684ce

                                  SHA512

                                  156083fa49cb0fbb1c23917c4e8ba8a0209b157656c2adc6ce8cb66ce66cca18fb7116a104efcac3f6286ce7493d9ebb8b9402afc84c5bc123e48dfe1935e153

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b2fde3234c5fa5fb5153f308cdb51145

                                  SHA1

                                  7b72d2ca1d69d887d75e8833cd53cec4e14ca818

                                  SHA256

                                  4931a0931a34d85562532a330bb4f326d0fce4b3483f5b39aacac7dd764df3d3

                                  SHA512

                                  87cec9e445d737848be41e2671b8c3255f55d59e4ab3fe3806b83840dfe4bc6ccf16fa054fe977db82c2e8a875493a06ab81a7b9c51108d242a5f807203bab16

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  95d958fa0620b1e0d53dc3f3a30108e0

                                  SHA1

                                  1bac6dd4d80e67b1657e65af9f5b29d05f9f5a04

                                  SHA256

                                  63127e61f44f65bd9888f3ebda58cdef74bce2b152fd2c9cced2258223aa8d9b

                                  SHA512

                                  caebee5a6f78c706913aad69b8cefc44252a6ed503887865701a6048b316081884e4659c6fd19f223b8c5c0bf769f20e7681b32bc0503bece8c771fe4989650f

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  71184df02125058cd7834e0d685521c7

                                  SHA1

                                  a529535b58ee271937125467f0a7dbe521204cdc

                                  SHA256

                                  6adf01af20dc6cb83453e1466dfb48b774cfe9ca9168f12f117ee85f5d8c0be4

                                  SHA512

                                  eb54b2f582b83a3d4049f56330e0a863cd017ebf4c231db422ac1c7f32ec28103eb92114b557a93f474ca1bcfdc13813e4c591a57ac471d4ef329a87c3822890

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  5bcf4cc3e0fe4065e565b9f5e2160126

                                  SHA1

                                  7eccafdce3a7fadc06b70676f798193a2ad340aa

                                  SHA256

                                  28cd08c8f4100ca6cc3605e9442306590bfd536b92a9ee449b827182dad749fd

                                  SHA512

                                  7f4d0c128f9d54413f1aad0ea504e2ee24ce35a0e087790d61f4bb9479f7901d5d0afc4c28f7014d3b354f0b3ae8ad3cf8687e872d1172c192e10c1c56648ff0

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  18e66eb75d78e631e0c0576f215563bd

                                  SHA1

                                  b5b797b83eef9a87faf031e290c6da13737be456

                                  SHA256

                                  c851c994525cfc8c42ed773ed92ba53117a4e1e911d6da1bc8a2276a201a61d3

                                  SHA512

                                  4e6d6ce09bf14c0dcf81f1b19d18f1ebec61f38efc2ede5ad91dc4e69c2d216be876fe53e51faa1b6243ed45e62106a3bcca6826f5e70dac7bd5283baed88747

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  944f9429281d5cbe60fbfb25f3b02922

                                  SHA1

                                  45aa8398132fb92c8d128337bd11cdbd2510551e

                                  SHA256

                                  1df815c22aee7aab26a288c8b6ff805ec00ccf5edf04913020a7844a7c8791d4

                                  SHA512

                                  4ce1f3d7252511674e67d61b56c2d6a7856a03baf83f2659e772f5814a63d2ef7718221bd6889a2169dc0043da9f6eefad1ac47b830e8408edbe829fbe2e27c0

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b2f24096b510dfc78ab4d97f6e360803

                                  SHA1

                                  e42a0731173e6d1d55f6bd16736df1201f2a4856

                                  SHA256

                                  1009e254cf6a9272dcf29568304bf2161cba44b73d8b6cc24e01187cbb7e0df8

                                  SHA512

                                  7dff7b26c95e2bbfac8a4d620be4c1bbc3857c61471d48d4ee1168b655316f492c87f7f6732d8e052e4d4f173df37c3bb2aa0205cacd94af4cf75a68a1d663f5

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  b43beac16a8ce097ddc60d28a1bce3b5

                                  SHA1

                                  ea5550764949834c11725d908dbebfb7883bae95

                                  SHA256

                                  8fac0f05c7838289b1cf5b75646b9327e0e58040e9ae52ff339ef38c327d34cf

                                  SHA512

                                  878df42c02d6f4f8cefc0d336ed2be84173e717be91fd40f03fa483ec628356a0659dc4344631d5f19b190309c5ccd46f9edb973267f7e6a6dea6070869b1997

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  344B

                                  MD5

                                  51d1d036cdd3c9eb8e193d110fbe9558

                                  SHA1

                                  dbc1d085e7e0b45a880ae19b83d7546061931420

                                  SHA256

                                  8949d19c59e52b1050e7f2e9597408e0ecac656bf33d457e79d21c1bd1f79097

                                  SHA512

                                  c50cf74c076c68c4769efccb4d83b8f8645f846de094921747675ca6ebc8310824fa42ca1d522787ceddd1d8eb1e4476a3ae10b845133471820f76377ef712a8

                                • C:\Users\Admin\AppData\Local\Temp\Cab7208.tmp

                                  Filesize

                                  65KB

                                  MD5

                                  ac05d27423a85adc1622c714f2cb6184

                                  SHA1

                                  b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                  SHA256

                                  c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                  SHA512

                                  6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                • C:\Users\Admin\AppData\Local\Temp\Tar721A.tmp

                                  Filesize

                                  171KB

                                  MD5

                                  9c0c641c06238516f27941aa1166d427

                                  SHA1

                                  64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                  SHA256

                                  4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                  SHA512

                                  936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                • C:\temp\CreateProcess.exe

                                  Filesize

                                  3KB

                                  MD5

                                  608a34699c39e2097c0248a03f341909

                                  SHA1

                                  97a3c9c057f98533d0e3230beb215d280860f8eb

                                  SHA256

                                  86c0ac299c7c81ae7afc0942b7bbda87582bd96ef5162150bbe97f2e4c42dc7a

                                  SHA512

                                  b392fe085fc8008d059d84f2167b0a1fc61c108917a5a91ae36cc02605e287ed32cd21f6f6f00c000d1a7fe5cefbe2e1d62c442e32202ba8482942446b01ac44

                                • \Temp\ytrlgdyvqkidavpn.exe

                                  Filesize

                                  92KB

                                  MD5

                                  2d677fd7d3728eeb19330e53594d465b

                                  SHA1

                                  d09256886a57d5edc3be2194fd6cea2f65f7de3b

                                  SHA256

                                  8f861e2546219c2f1734a3a02ac32847b68fb92975518fd7861e9990aec2049d

                                  SHA512

                                  a0a914f12905778e50571f7c3cc1256c62dd59b1646237d6551360e0e1714b69285be236176d540a5eb1c3fdb5324fb925e5c39ce26a3a4ea9d8993a722993ba