Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    32s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 18:18

General

  • Target

    33f6ad45101924695ada416233770cfb.exe

  • Size

    512KB

  • MD5

    33f6ad45101924695ada416233770cfb

  • SHA1

    0ff77081cfa9f9a5b3593a2462548d59516054d1

  • SHA256

    6d8dc1060bb48b1689e1ff4f705551476255d58fbfecf67e3a92d9cd3be8c582

  • SHA512

    2ea14184a82e16a39c099d7b476816f54f058de22e546ac29778db8fabff702eb6e144aed06a1ad03c423fc61f17ea54ce324f4bb39da8a637a7825335f4711c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5U

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33f6ad45101924695ada416233770cfb.exe
    "C:\Users\Admin\AppData\Local\Temp\33f6ad45101924695ada416233770cfb.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\SysWOW64\dqzusnaorutyfzd.exe
      dqzusnaorutyfzd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2056
    • C:\Windows\SysWOW64\gxdpvweqmipaj.exe
      gxdpvweqmipaj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4844
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3180
    • C:\Windows\SysWOW64\ajybovdj.exe
      ajybovdj.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2408
    • C:\Windows\SysWOW64\jfqsuqimfr.exe
      jfqsuqimfr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3140
  • C:\Windows\SysWOW64\ajybovdj.exe
    C:\Windows\system32\ajybovdj.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e55b95b66d08b45bb7481190ddbf662e

    SHA1

    fe22a61b43d2ebbf8a098bd4ee264aa3832b8704

    SHA256

    1379ab071d360c52759a4c536400c512dac448fa8de00fb51d1514046ef29530

    SHA512

    bb95f0b18cbbb464d62065c4befc5de67267f5e0de73b56a76e42b02ef6753803f8b511b9539ef9771b1d245da29e185b5d21d7614337018989bd87dedfe17a2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    9c97e73c85450850c23e01959029bfa2

    SHA1

    5339c340401501a9a76766942103c15275442cf1

    SHA256

    b481766d9bed6997db1a207169a80ff0c01eaf9f5c8e99ed5ad27e20b3e422ed

    SHA512

    bca2ae3c4b979bcbdcf122e10b33b6f2a2b76f661c6c3a7803c2129a5751c8ce6c1794a620066f24f1f444d6bf7e4c7147d327dfb59c570b6912f4941bec3fca

  • C:\Windows\SysWOW64\ajybovdj.exe

    Filesize

    512KB

    MD5

    b4e7dc753ac138cb3b0e98738a8b8377

    SHA1

    0246540c2715c4909286867d1ccd32f331b3e347

    SHA256

    8a8ed5964bf2913a6d6eba537979ceb9e46575a096f055c0b8209ec34821a4f4

    SHA512

    c0acd109ce53a9ce3f41aca35161fdd1dcfc529df6f7c98c795b928f1baa77e5e4a562455d700b639dbcc424c4c1bb731f077db62dd81fd2f1350afcd21f68c7

  • C:\Windows\SysWOW64\ajybovdj.exe

    Filesize

    92KB

    MD5

    6662b185f19fbf697c56a25c92de7961

    SHA1

    0df0c0df0de3724258df2549c583e3c934aca726

    SHA256

    c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

    SHA512

    c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

  • C:\Windows\SysWOW64\dqzusnaorutyfzd.exe

    Filesize

    512KB

    MD5

    db5309059835457a197c275818f59e0d

    SHA1

    da21400b1db678b4c5ef7786981fc3c75bc05baa

    SHA256

    90920f57bb3fff972b4381f129befeddc2646669c5b0fce807f8a1b6ff8744f2

    SHA512

    0b417c8fb1e65f775888d6417887d0438d231815fa0315e29513311a3aaa2ae8fa552bfaf3cc0fff694d65ae966c0c777a5a1c4baa9dc62ead3c113a3bf1929f

  • C:\Windows\SysWOW64\gxdpvweqmipaj.exe

    Filesize

    512KB

    MD5

    6e92dedd481cfc80c3f0d8da63e04a8b

    SHA1

    2f50d1f95eefb14d61ada73ae0af8c79f9e93123

    SHA256

    a4530acdd4bebbcb4245333ceae34c82cd9a53efc20f778f8a2cf70601b5083b

    SHA512

    a1a1fba389e64bbfcec29dd2e904bb663bc0b299f19850e278b64e1ed82fa9085089e10faa30288ac53853a1c94e3f36fd0e976ab6fd7fa3c1860a2741a1b3d1

  • C:\Windows\SysWOW64\jfqsuqimfr.exe

    Filesize

    512KB

    MD5

    e40b2b03f595bc0cf2eb80a250e0d90c

    SHA1

    025f3c2987e5bfbeaadfb6cdfdf26954f854b580

    SHA256

    9537338860be8f34ef7bfc5161e0d73a8b3883dde6a7c85d88dd169eb5e5c62d

    SHA512

    a30a5d97215ef6ded2c9e07b345c84bd7ced12905f8f5005736eaf3e3fc1a4510381537c8e636a9a0c76c82b1e9b774eb346b450bbbd9597a43fadf1e66897ad

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    95KB

    MD5

    325d35d16810bf2ca20f49e9369ceafc

    SHA1

    16a818972ea75b6656eba8b6ca090be9e0bc8f03

    SHA256

    8798efdb1d409d30daf09e596ff0a6875f2f9b89e08c16e891206ddf0771a645

    SHA512

    a0664efd0a950150ffa3b7f79d76038579f20835e4b99043db61586a475ca9f06f1907b7cbdc46e36feb556a8d4cbf473a7f8a5aa51872a41b997c8904284893

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    46cd869ec43ea1317872e14cdb5d2369

    SHA1

    cac1949891d223797e7779073ad4719ccc572187

    SHA256

    a4a412030818876403a9e86b7eae92c428729a58ae8f5ac4fd9a67d85abd5635

    SHA512

    741c878e2f0995b527c5900f096c499fd5d768bb79566ba04159a3b825ae7486424a58a260c59c58e748b7f7d02b84fa5e1ab87059266c69629256d2264a3e0c

  • memory/2576-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3180-37-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-39-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-47-0x00007FF839CD0000-0x00007FF839CE0000-memory.dmp

    Filesize

    64KB

  • memory/3180-36-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-45-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-35-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-42-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-44-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-43-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-46-0x00007FF839CD0000-0x00007FF839CE0000-memory.dmp

    Filesize

    64KB

  • memory/3180-38-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-96-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-97-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-121-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-125-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-124-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-122-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-123-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/3180-120-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/3180-119-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB