Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 15:22

General

  • Target

    28f8806a43c81ade4aded3b5adc6cde0.exe

  • Size

    512KB

  • MD5

    28f8806a43c81ade4aded3b5adc6cde0

  • SHA1

    acd51b1accf5f3a27c5cf7568e976fca4e3b9dcf

  • SHA256

    0150beb4a08d1cb109618ffea4545dd9a8727021133fe7fb784c7ab81cbbe8a7

  • SHA512

    7511497bf86e6ba03a83bd75252c97161b368967b5cd768a99708cca9c573b74f5c50b103216c23e43ab1569c78b036942079f6602b4a7b913962d0fb4eb9e1e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28f8806a43c81ade4aded3b5adc6cde0.exe
    "C:\Users\Admin\AppData\Local\Temp\28f8806a43c81ade4aded3b5adc6cde0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Windows\SysWOW64\rsqfldlerk.exe
      rsqfldlerk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Windows\SysWOW64\yatqpiic.exe
        C:\Windows\system32\yatqpiic.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4832
    • C:\Windows\SysWOW64\bdeycwbvgczffia.exe
      bdeycwbvgczffia.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3760
    • C:\Windows\SysWOW64\mipgqcmbrrkll.exe
      mipgqcmbrrkll.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1816
    • C:\Windows\SysWOW64\yatqpiic.exe
      yatqpiic.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4352
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\bdeycwbvgczffia.exe

    Filesize

    256KB

    MD5

    a6912481eb039ab8ce8e65eefa5ac57b

    SHA1

    5859f27fff5ebd524ebd24615ab41f86fba46f02

    SHA256

    660f3560eeba127d97ee2570ed1c2dacd357f42f6136589ecedd2aa3004dccb4

    SHA512

    8f3bd0fa20db122cacaaeb9cba2d755db7a1d51371da190ea9337429d514ebde3336cd55f2db82358e06fe8f7906f50cb1799cb494875e3e38f478640697db40

  • C:\Windows\SysWOW64\bdeycwbvgczffia.exe

    Filesize

    512KB

    MD5

    d5b8f9a364b4bf12b275ea3253341dae

    SHA1

    462df3d411a78141ee76a20f2cf16dce7fa720dc

    SHA256

    0426e0cc7fc02c522a3db5b65aadde0655fdbb7aa12f5aed4cd51709accb588f

    SHA512

    0d50fea2539b1f5ede625321ff743796cebd16e4268423d367d88448a47a90cd2844af509c495f934066ca16da758fc4551ad6fd9140928a7f0a586486b9d5ae

  • C:\Windows\SysWOW64\mipgqcmbrrkll.exe

    Filesize

    128KB

    MD5

    33be84de0fa03c6883fec2ead970e3ba

    SHA1

    dbe35ed4343779aa93200c24966ccb805e18f223

    SHA256

    ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

    SHA512

    3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

  • C:\Windows\SysWOW64\mipgqcmbrrkll.exe

    Filesize

    150KB

    MD5

    e6525bc843b2e9deeadb8f5a45310bcc

    SHA1

    146ca2f84bc371a7a9954f458fc184dcabf18181

    SHA256

    7a0dcfe62b45c11e415e88ea423f7d6efe312497d20c20647ab9845549bd7c87

    SHA512

    717f6fb4e3f41618195e2ace4687355823cf7a1466829699a574f689e9156d992254715c80f56fdab0efee0ddf8f36c422c6b85ce08fd994d7a987c93ec7d64b

  • C:\Windows\SysWOW64\rsqfldlerk.exe

    Filesize

    512KB

    MD5

    8307a06fdef3f83c1828f4dbc5d79e6d

    SHA1

    57e0603a9bdc18c232e9f2c404c69512b8690725

    SHA256

    5fbe787560e06a58c548d67a95f3599ff9af531ff17b5549434fc37df3107f68

    SHA512

    c39a85d51c7f30f5f5e2f53371186bc9fad1d3186d9e5cb8669aeb28faaae0ee69e31aef418aa291d577b028e50b70b3d18b4053a6f52ce4c617ae93c7505424

  • C:\Windows\SysWOW64\rsqfldlerk.exe

    Filesize

    257KB

    MD5

    d3a4c6dd9b4c5e977140cc4359d964e3

    SHA1

    28301bbce69c8b2e489ff713570e540480d06e36

    SHA256

    2fcd6649cae0217107ceb02bef676d9c37fbfb01e2d28abcb5850d128e962684

    SHA512

    35eb782628461576b9f4842170989f76fedf9a99b72ef706d9d39a9777e28da4c1e575104e6a86732831d28f07b040bcd61032d3b95eafd71fa059adfba86efe

  • C:\Windows\SysWOW64\yatqpiic.exe

    Filesize

    65KB

    MD5

    6b2d87c29e03c1669c86b13f0e329f27

    SHA1

    fc01a8091ad1488013e09ecabcbb34ebb2729a38

    SHA256

    6cb9102f5b672aa60bab941d44dfac6baa33354a6dbff3a6cf1b7e16f4e1c61c

    SHA512

    62a6d356d9d1393f780e7ebef155962a8261e76e5c6df375d5d35484702607996e9334a0a3788cde9ee44d7d6cbfbd284c2163ff4e9837884a0ae5712b1e0272

  • C:\Windows\SysWOW64\yatqpiic.exe

    Filesize

    381KB

    MD5

    30aec9e0b33fbd99234328357879f812

    SHA1

    3c9d37139d4ccfe2b694afba9633170d0f510a92

    SHA256

    15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

    SHA512

    2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

  • memory/3700-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4984-59-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-46-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-36-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-52-0x00007FFBBF390000-0x00007FFBBF3A0000-memory.dmp

    Filesize

    64KB

  • memory/4984-55-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-54-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-56-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-58-0x00007FFBBF390000-0x00007FFBBF3A0000-memory.dmp

    Filesize

    64KB

  • memory/4984-60-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-61-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-62-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-35-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-57-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-53-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-51-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-42-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-45-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-41-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-40-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-39-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-38-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-37-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-124-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-146-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-147-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-148-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB

  • memory/4984-149-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-152-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-151-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-153-0x00007FFC01C70000-0x00007FFC01E65000-memory.dmp

    Filesize

    2.0MB

  • memory/4984-150-0x00007FFBC1CF0000-0x00007FFBC1D00000-memory.dmp

    Filesize

    64KB