Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 20:03

General

  • Target

    3a030c486057917499b7ceb5b7c779b7.exe

  • Size

    512KB

  • MD5

    3a030c486057917499b7ceb5b7c779b7

  • SHA1

    6c9f1049b204b6188bb045e2aab068aa025c31fd

  • SHA256

    ba1f3a8af79b8d23dcff35ca835a8585291b3db1307c0a0f1a58a8866d83f2e0

  • SHA512

    edb117caa41be4dab98ad2aa208ebd9d42852b3fb903d408dbba70f10f9f8d42c3bd109a1bcd7de999da8e248df5ccf5f146cddc8d0b62395bff18269cf70d8f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 18 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a030c486057917499b7ceb5b7c779b7.exe
    "C:\Users\Admin\AppData\Local\Temp\3a030c486057917499b7ceb5b7c779b7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\nngfdjzhybrhn.exe
      nngfdjzhybrhn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2688
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2196
      • C:\Windows\SysWOW64\twdkvxgz.exe
        twdkvxgz.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2740
      • C:\Windows\SysWOW64\lrxawnlmacqetlq.exe
        lrxawnlmacqetlq.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1720
      • C:\Windows\SysWOW64\fkmearhkdy.exe
        fkmearhkdy.exe
        2⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1996
    • C:\Windows\SysWOW64\twdkvxgz.exe
      C:\Windows\system32\twdkvxgz.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      66KB

      MD5

      9dc508c41a4a19b888828524d377bdf7

      SHA1

      782564ce9ebf19b6fa5678675e65cb70cbc63a17

      SHA256

      2a8c7500bc68da2db27a22c81a52ed9af2a41789cbefffa84244f73faa7ee453

      SHA512

      ed8b276a7e20daa1c34baed7ab940ae138c57a67fd683e2d22871ccabbe52bbca05ad093c8dd82cf90c1f5ca4b537b7b8eb8fa12b2f12c37113dfc095eb417d3

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      90KB

      MD5

      f9c22ea15922eab30e9b97161bd6b396

      SHA1

      9a22089896ae8656f496d051c89b53cf8c6c53f9

      SHA256

      d1284e97df42213bff2830103f95d97ebd05d3d6bdc8b272d9330bfda16e7ee2

      SHA512

      6ce5aa618d60761e5c3841aaa73403dab4995d097ddf219301cfbcac3173877facb05ba2616760ea84fb94656c7e2110cb9fc80667fa0331e3aab818625f0afd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      5a81a833f2dd43c143a9a19b33f78811

      SHA1

      840aac9569091cedfcb6d2e6c5ce5b97db9ece47

      SHA256

      5d7674fc8af0092c6601d73558dd2515becdfd6f0815e7a0fd9c9d1edec71a1b

      SHA512

      20532e6e374bd41d6175a3ea25314a5f3b4a2754fe3237be450d016dbf6b4c7dbf59197023cbd705da8fcdb2a068d2a4c8da8a53011c2e1b7f5bac280b85148d

    • C:\Windows\SysWOW64\fkmearhkdy.exe

      Filesize

      92KB

      MD5

      f6e2b080a712fd8062bb5be6c382a1e8

      SHA1

      9f77d6ac645c356462ec12962635d281f8b062d9

      SHA256

      14f9765336ee2cc5a58f1caff103c4a8fe0e92eefde552fc3884955fb906b230

      SHA512

      8c173870bdff9cd056f4eb979345eb28de116582c865e3a931ce139287a52020f42f617b5afb5cdd9e18387b916376d683d2308ecd721432b2b74c26b65e1481

    • C:\Windows\SysWOW64\fkmearhkdy.exe

      Filesize

      512KB

      MD5

      6b03398122fe304ee6140567e941d721

      SHA1

      2c7de356db60fe2693e029fa6a8174f2a774c6d0

      SHA256

      d28de86ca3a2bac614829e634994753bdbec79f43fe2666442843db460d1704c

      SHA512

      cb9dcb9b4f39b2d297770a29e9a701ff0867265c22a55f0124b60ceb3931eb6ba3ea634317dc2edc4ca2230a08d68f438d1b74755cfd261c84045e9ae011eff6

    • C:\Windows\SysWOW64\lrxawnlmacqetlq.exe

      Filesize

      483KB

      MD5

      8ab2e6a4818bd3a87236a0018ead0b37

      SHA1

      789b3212962949ea56222446bc249cac801500da

      SHA256

      5f0340182856f4e2fac2d4a47fca5ad53ae1028b7b4071bd6abe602ec8a85120

      SHA512

      c65dcd1caeab010cda8bd4166fcab63cfb0ed8c93728eb25d71fef69a468ac2ad4397ee77bdf8c3c9d7a19b67af522f9f4f8f852255f450096c2873cb14897ea

    • C:\Windows\SysWOW64\lrxawnlmacqetlq.exe

      Filesize

      200KB

      MD5

      f816bede655927421e5866bfed385820

      SHA1

      697efc6ac16132bc38e1602ce6abbf142f36095b

      SHA256

      e2629e42179cc6ce46f2d642410d0b1b6b244a9f8c1f1988e35b59aee1c02c72

      SHA512

      7267dac994cb2fc960c7ccce918e0b75f5cb4697954e59c1b5451459067c71585bba312881313dfad3277d3b07d8d74da6b95d7259d750c65813b876fdc403a1

    • C:\Windows\SysWOW64\lrxawnlmacqetlq.exe

      Filesize

      512KB

      MD5

      b5f31818c6f65780237d0b7a64dbab7a

      SHA1

      bce0db394b3c544034b27d9d9ebc37fce2620107

      SHA256

      53f550d104a1e1597fdd5370895de202a518e0452eb4557eb2e17239711b54a1

      SHA512

      cc565d5ab75fd1941a0113af70eae6dc265c9387d293bf7b7e227ea221c0848e7f77f782e7bc21c4b808500f26aabd37649e0783d56eabacba7418759a36b5dc

    • C:\Windows\SysWOW64\nngfdjzhybrhn.exe

      Filesize

      138KB

      MD5

      1d4e9ccf1b6a7128434de6c05ac4d7e4

      SHA1

      0c2be2bfc3fb924d5a96851211642c21592ce92c

      SHA256

      10b2113c60edcc6d5bb2046981c1b225dec1c0b92459042f413e1b62dae379fc

      SHA512

      ed5d601902b7662e65f8e9d6dd1e08552c840e78b183b4ed4314c3383800708839c89ea1cef423c1f658cc20c1a5bd3e9917096d3ca7feb925eb19b1f01eb245

    • C:\Windows\SysWOW64\nngfdjzhybrhn.exe

      Filesize

      85KB

      MD5

      27623bf17711551baa843bbab18a4b07

      SHA1

      2d6d50bab42c5defdd9bdf3f14fb826853558392

      SHA256

      6a2c1908feaaa4585f579f19881c7fec6c64bfe38500306f55eaeb5fa0a7b368

      SHA512

      53f01abdb0a6c91cedd6e7bb705ad27f9dfc89722bd6bb07ad9df87ff00ca5c9fc6764706ab6edc018fd90f519cf4d12af670416b3fff7cee5e6aca87e9f153b

    • C:\Windows\SysWOW64\twdkvxgz.exe

      Filesize

      257KB

      MD5

      42715f1ab6b2062c5d2f9e103f589be2

      SHA1

      19949b197528822724cc429fa66333a842f0ab08

      SHA256

      c9e06210e7b49c4431bc7ffff7f8f34c1af59004cfed513aa64dfe996aa7db37

      SHA512

      2ef7385f8fae204a50e385f2b7091c79f60cb2eb5aa40de22c0d4389e59034635c44fb878257a1deb1cd92e65f1b788aedaa69169ca37646cd5f75c2fa331fc0

    • C:\Windows\SysWOW64\twdkvxgz.exe

      Filesize

      76KB

      MD5

      44da709b3074137f363068662032cd5d

      SHA1

      4b08eabc8c29bd327b205b86fc86faeb786228e5

      SHA256

      6c830798bd184598030bdedf58be642720487c1b3a49553e57a623e699d3b8d6

      SHA512

      801da8856826ab4cd2b799e9c48a8b5037f84e736068a162523edaeb53d2cf470aeeafa8aba40117a9cdd4fe1d72107b529234dd05f374bc5000fc1855e21bf7

    • C:\Windows\SysWOW64\twdkvxgz.exe

      Filesize

      26KB

      MD5

      2a6e9cf6d7f01bae86f40f69ec65bf48

      SHA1

      4b968e267ae5e8632ef4690fdee66aafd93b2c62

      SHA256

      ef519bbc052ba54e7a429bcbd3967de6054b5fa1d080f901930e2e14b4a169b5

      SHA512

      62083b4573bd39ffeec415cc88baae6de3fb0700a8c5ed657cd27a4721fd64b0b1e19afa53b6c3b4745b558b19f3e23fc18de1ec2d63449c41912d6ac4604d7d

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\fkmearhkdy.exe

      Filesize

      492KB

      MD5

      7bfc4e5c685c5a1b941f07842e70ac22

      SHA1

      48a4319cbf0d9b7679ddca225fb56506a8dd5d75

      SHA256

      39c8d7fc9ba3b695fbc5010164d00a48eae598c1caccbe951b91e3a59c1e8edc

      SHA512

      02c61875fdf244b14e1459f750b49994aa8bdea8af0f77f5ecadbc7556060e4167f5baa4e473a74ec7c6c52e38260b55f07db3e0e296cf961b424df4a0f3b5c7

    • \Windows\SysWOW64\lrxawnlmacqetlq.exe

      Filesize

      307KB

      MD5

      19c2e30f6b50de166cc673003073eab2

      SHA1

      bb4f8f810a19d2525bde450c95402f1bf5ec604f

      SHA256

      815bbef557247e15a4d355bd04d98795d3f7535b36e13d6ead4eb82d0d4a01a8

      SHA512

      b55ed5a355e8d727e10b71f05af67cb3181f525ddbdf1d2267ce0fa1c90092f7544ad5fb3701adeed5e63fb4df9d6e7c70e649ebd129f002d082a0f9af1c29f1

    • \Windows\SysWOW64\nngfdjzhybrhn.exe

      Filesize

      137KB

      MD5

      80a2cb8cff25d8e6aa6f6bb26c2ff4e2

      SHA1

      559bf3dda905af0ea2a16ad4065cf0793214e8b6

      SHA256

      4dfdd49af018c5fbbab09bdb2c6a377e42ddee63a7064aec9df3e3a767ac25fe

      SHA512

      adb882e9227c019016ec9d20356fffa1071a327f115770cadd38c25f5484286dbf567e385ad194cbaadc54edb013a9d5d60c35cbfd9270c269de345c58601b4a

    • \Windows\SysWOW64\twdkvxgz.exe

      Filesize

      366KB

      MD5

      ddb765b6e54500cb9d724832ec0308ca

      SHA1

      8bf42da5a56deb52e0025aae7a8aae71fe245678

      SHA256

      1f8d0cc91bfc2c5aa0bb2811b89a1e7390964872fe19d08c62723010cc490d10

      SHA512

      39623cb0967063e1e23b0c1ff68ad1fef1870f208b3d40f17fe1fce20359cbbff055df0a28e304fa655c8ee04e0acc2501425009a3066bc3a73992119bca1744

    • \Windows\SysWOW64\twdkvxgz.exe

      Filesize

      93KB

      MD5

      257f28bd5bdc2b725434b7ab570814e7

      SHA1

      972446e0f8d210c5d6f42a57a921391a236d564d

      SHA256

      d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

      SHA512

      c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

    • memory/2180-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2672-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2672-47-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2672-45-0x000000002F6E1000-0x000000002F6E2000-memory.dmp

      Filesize

      4KB

    • memory/2672-75-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2672-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB