Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 20:03

General

  • Target

    3a030c486057917499b7ceb5b7c779b7.exe

  • Size

    512KB

  • MD5

    3a030c486057917499b7ceb5b7c779b7

  • SHA1

    6c9f1049b204b6188bb045e2aab068aa025c31fd

  • SHA256

    ba1f3a8af79b8d23dcff35ca835a8585291b3db1307c0a0f1a58a8866d83f2e0

  • SHA512

    edb117caa41be4dab98ad2aa208ebd9d42852b3fb903d408dbba70f10f9f8d42c3bd109a1bcd7de999da8e248df5ccf5f146cddc8d0b62395bff18269cf70d8f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a030c486057917499b7ceb5b7c779b7.exe
    "C:\Users\Admin\AppData\Local\Temp\3a030c486057917499b7ceb5b7c779b7.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1732
    • C:\Windows\SysWOW64\puvfodurdkctp.exe
      puvfodurdkctp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1556
    • C:\Windows\SysWOW64\vhxflvyz.exe
      vhxflvyz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2256
    • C:\Windows\SysWOW64\zqzpiywruopxcff.exe
      zqzpiywruopxcff.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4612
    • C:\Windows\SysWOW64\rcpqjbfixn.exe
      rcpqjbfixn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4424
  • C:\Windows\SysWOW64\vhxflvyz.exe
    C:\Windows\system32\vhxflvyz.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    146KB

    MD5

    e0de1984688e173c21ab967490c681e8

    SHA1

    8ed5479a5e9072d75ceef9358e1d4a5fe13d783c

    SHA256

    92d892f02c4a21fe80cad55dfc11e7e5705ccb0910dc1cb47536101654d4a52b

    SHA512

    b49c82f4c2ead6d7cf59792ae4fcf235db9d433a83a01910cfdb27639aaa5d028f0dc3e118a5be6fc254f763ab5f2f57a523dc74f09269d8843dcfba40707cfc

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    176KB

    MD5

    a586d8638265bc28622988cc4bfd3154

    SHA1

    45a21a3d7367c51d9f56a232679b18259d80f1f1

    SHA256

    0d50b8e24e66254574098b0e05f128a7f75100c1ab4fc1dc889ec4e7f12b241f

    SHA512

    d7b276d0742a82583a8275ea583a0c237ab090660dbf3c38d3ac3f95d3447995652f29266d70d14a96b30e862a9794b57664abafe95f0faa456cf575f3322c0f

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    142KB

    MD5

    c8de8c1593636e26d12693d031a2ee2e

    SHA1

    c7414711ec0bf4b9d44eae920f963c700958e349

    SHA256

    45882c5c47d929c0ac20016cf579d2c67eb939ffbeef2d75657301db504fd2fa

    SHA512

    c84d6dffc34076c181091d239e8324546325a0384c3fa4a04b460a65d5fefb1b5b8b875b85100cfe0fa228b6da4531032ede60c92532ecae8ff6d49b18b0baed

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    001aea52c180946a15bf4500a3fb6b2b

    SHA1

    138306c3568a81c272b11b7e1c53e64824a9327c

    SHA256

    4576d9e1fb2b36b3964b0d6bacbe1ce53e7026339a26232149c2bdafce0252b8

    SHA512

    3e8ff89d3cab9eb912eabd47a32494d9fb05e09afb9ac6b7ae609a40adab740a0953b66c4602cc608b79e098f3fb43aa0e67bab9d393198b4d6ede76ae00b95f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e1649a4c11ae0728121060306b9c3b60

    SHA1

    43fb88234b3dbf3656e7abec4f2ba6bc61a4dd37

    SHA256

    b6ef1bbe7e6f74d1238a92decec228bebb8559930ea23a9bf16e9ef4268f96f2

    SHA512

    17f67318c9f2a60ef14eb52ef59e2b306061e3c997c96aea56d61a318ebaec122b9d22c4e46e02ef1fc329668a33f60fe994c22ddc2c38cff1fa7615acc34ee3

  • C:\Windows\SysWOW64\puvfodurdkctp.exe

    Filesize

    152KB

    MD5

    ff108a08be7484ecf2f294d5ba6fa14a

    SHA1

    9012aef2b824eb470526f50a43d4e404fcaa9f1c

    SHA256

    1315a0c8c246d6348f9652331f7ad9f271d596741cb0cc1b642187c79800bac0

    SHA512

    f4fe00dd03dcbf8070db34697add482fa7dfc9045d9303b4384e9505aa152dc9db4028bdc0fab2752bd75f63bd139b32918a89e505ca19c9909c88033ccd848f

  • C:\Windows\SysWOW64\puvfodurdkctp.exe

    Filesize

    130KB

    MD5

    3f4a624f388bd1aee33f3d256ccb0185

    SHA1

    14c277bd0e607d4718dde5803b1fdd00bc6c99c2

    SHA256

    15fa0ebcae0b79aaf4f609324bf48ab82c184c3ba6575526595cf15537bb9ffc

    SHA512

    3d7c2b053c6865257fb1617efbd545a4c2235f6ba072590c92223ba4d4740f3bd183434a01c7944b682ea05453e8b04936d9837dde619e87fb392461d92a49d4

  • C:\Windows\SysWOW64\rcpqjbfixn.exe

    Filesize

    269KB

    MD5

    02b9f59803f68c1101e5f47ebab415a6

    SHA1

    976a35dac3a4ab6401ddd63192476930522877eb

    SHA256

    287de6621d2a0b8c028a4a931d8ed25770b5e925163b964faf54027b3ca491a5

    SHA512

    2bc738be640b586e63d4932ae5d8a4336528b8699b529a396fa2e7d265a68deac3d75e89c46e102be03b139bf41e746a807175cbbb25210541ef9bf7474e9677

  • C:\Windows\SysWOW64\rcpqjbfixn.exe

    Filesize

    78KB

    MD5

    a658ae04d262c1b93632871ab33c6a19

    SHA1

    350962fed050613d00efa829a9581a6a7a5024ee

    SHA256

    6c3928ad85d999624e34db8c48ac407cc0bbe4df761646c22a0a60c9b0366f03

    SHA512

    ae92f14d2cf2db1a9465692388097e44a916a44b54ac350b35634908f2f52615d06096d2b412666872fbcd7a89d6d311a3d2bab2bdfbdd7b644e7b2057d472fb

  • C:\Windows\SysWOW64\vhxflvyz.exe

    Filesize

    92KB

    MD5

    6662b185f19fbf697c56a25c92de7961

    SHA1

    0df0c0df0de3724258df2549c583e3c934aca726

    SHA256

    c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

    SHA512

    c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

  • C:\Windows\SysWOW64\vhxflvyz.exe

    Filesize

    150KB

    MD5

    9526c7e867cc0ea52f75de15ba32a88d

    SHA1

    2e0d46a1d5158f9ff6c979dfddf29b011ea66587

    SHA256

    77ef44e7df31a16453ee770a3f811958a41b9c913c49673e4b634d30caa88f75

    SHA512

    d15aa4e9d5635423c771294c4835e80dd23aa696aea498338caf29d508d0d3e4dfc5aa7278081b49758a0e8e28b90c0e63238d3f5d59c39b7afe5c296f97a544

  • C:\Windows\SysWOW64\vhxflvyz.exe

    Filesize

    52KB

    MD5

    82eb4313c660248ab97362018028764b

    SHA1

    a6e21ef74bf7565b84c4ab1abe6cf5c94e6dd089

    SHA256

    3211eb7b899697d19e9962c35cd0453c6c252ddf0c1dfac1e3d9f58efdb5cf1b

    SHA512

    3c04bb21ab13dc5d50dd8843a3493b461e6831cc63f477a207850ba4d821963ba4488c1e15899365fef42096b6e49d2d790e8ae20086a979743f32063d5ef15e

  • C:\Windows\SysWOW64\zqzpiywruopxcff.exe

    Filesize

    71KB

    MD5

    6761d8ea9ab8896dca0297acd1b1ad06

    SHA1

    fd9a5fc2dd8ad78dc666283c67a57f81a956a045

    SHA256

    ffa787a628cdee1001cee80bbd7ab390f62961d898925c753eb546dbdeaa20d8

    SHA512

    d0cc1b0a68dfc185e8c50c1d6dfe8a4d54e7afc44639033f8f6f6dcd16e8eb6791dec2a1627b8356b1cd7b84088039bd9fcb8d5b623e7c2afd01d12bf2725e8a

  • C:\Windows\SysWOW64\zqzpiywruopxcff.exe

    Filesize

    143KB

    MD5

    adb56d45d5344d410725ad988b1e0b81

    SHA1

    9181b4699916ae7268f299cd0ee95a6f4e9fca66

    SHA256

    6a30aae357d3d05b1ed60056aa7db52063c42e2e07435cab632ea0c6c5142899

    SHA512

    3fedb824965108ca750c3f05756a57ce2caef48a92a140fc343375b16c612a1de6b3f56cc493156577e8453a04fb9bc2aba3e7817bbd34e2aefbf19ec22474f9

  • C:\Windows\SysWOW64\zqzpiywruopxcff.exe

    Filesize

    333KB

    MD5

    34031dd7adc9afa7395c7d9c511ddaf1

    SHA1

    36c231e06fdf6dc5371bbb9112b6fcb70cab211f

    SHA256

    68fed7abb5854c0ccdbc4ccbc904d70e834bbb3701544373e09136018ed1039e

    SHA512

    d0f2f8044529da4b5a4a1ce6054c0e788b0ce8fd097d8af4dbf32eadcf55ba6f18ca12712fc6419db02e0b795c64f50a3a9b107a9000f892fe8aefccced47698

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    5c794e3605555d6f83311c4d1bd05094

    SHA1

    de4292dc733c959cef97c2463322d76e34527a3a

    SHA256

    571aa5acf9208e7203532420194024d7dd10d44df952e0d2a4f788c43b863ee8

    SHA512

    eecb6f220c2b922913403360537edac60f1d953632372beee0d3b5544cd675c67e3d4c39c7430c59b133c915532444174e920757231fe97965d13d77e4ac26af

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    bb7e30febeb904d0b87a57931068caaf

    SHA1

    708719afbb343dc0629e95b85cbaed83b1bc751d

    SHA256

    651b7540e19ab88233b257c953e6f229e2f290870d037fe7f31a27b00cebd4bf

    SHA512

    5450c4f933db4d2902727035ed0d82f37f0e26e5df063f5a9adba600f66668b16b3a23125e049bd30d9ef4103b86d66c768f55a10321b81f7f154da3ab7fccae

  • memory/960-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1732-36-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-99-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-40-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-46-0x00007FFD33090000-0x00007FFD330A0000-memory.dmp

    Filesize

    64KB

  • memory/1732-43-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-45-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-44-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-37-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-35-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-39-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-38-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-47-0x00007FFD33090000-0x00007FFD330A0000-memory.dmp

    Filesize

    64KB

  • memory/1732-100-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-101-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-123-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-124-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-125-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-126-0x00007FFD359F0000-0x00007FFD35A00000-memory.dmp

    Filesize

    64KB

  • memory/1732-127-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-129-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB

  • memory/1732-128-0x00007FFD75970000-0x00007FFD75B65000-memory.dmp

    Filesize

    2.0MB