Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    252s
  • max time network
    294s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 01:23

General

  • Target

    490af43a1ba402f98445a6dfe8668770.exe

  • Size

    512KB

  • MD5

    490af43a1ba402f98445a6dfe8668770

  • SHA1

    997e4dc71109e9f6091eb286b6ba86e27f398893

  • SHA256

    32499086592efa3a49548ee607808a74185ac96c003982cb94cb3c95ae0df74d

  • SHA512

    c6f9515c60bc21e964f4ea15b14e54d2b9500e538d11ec99bc8f08106c21c4656f2d0b6c9484130a937f71910436057d6bbd32176951c16f9433eaad11f19da3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6d:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 63 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\490af43a1ba402f98445a6dfe8668770.exe
    "C:\Users\Admin\AppData\Local\Temp\490af43a1ba402f98445a6dfe8668770.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Windows\SysWOW64\byoctyoycu.exe
      byoctyoycu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\gfiwslxw.exe
        C:\Windows\system32\gfiwslxw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1820
    • C:\Windows\SysWOW64\gfiwslxw.exe
      gfiwslxw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1972
    • C:\Windows\SysWOW64\agiuaggrxqunz.exe
      agiuaggrxqunz.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2104
    • C:\Windows\SysWOW64\kzqhxdvlgucgimd.exe
      kzqhxdvlgucgimd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2944
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2828
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:268
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0xc4
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      569e3fd1acc8e14ef8b502e023c16f57

      SHA1

      dc3891dc1f559e43a24fa864ebf944bf938d9ad0

      SHA256

      b1cee7dfdeb1549ebf2562c7f2613e8381af4ced154ec2127f93cea78ca26654

      SHA512

      f26adac76eedf3fbfbb5d17a1d93d0080cd515ec36d99ee29a3706e7fb619fd74c04673c0e0c67cc506debcdf10caff1344e828d7bced0941ca90066fc304564

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      1d8ff152a949ed37d2121d5fdf4e85ea

      SHA1

      46b7cedc78a23bde84ff6708d29b6017f8bb9d1e

      SHA256

      ed9a4ebf15090498186b728eadff843146998f3f762b715557ae0dfcca3cd6bc

      SHA512

      3af96f57be1f8f2bbc35b10d3bf660b3684506c64669617ed737c8e4dda03f7bf0ca2ff9ed7427459d00ece2f99e6e12822cbcd2d03073283a43288c03890eb8

    • C:\Windows\SysWOW64\agiuaggrxqunz.exe

      Filesize

      480KB

      MD5

      324b67f861792beb7fba41525036bbfb

      SHA1

      dd89e0573763b63202e1dcada90deb8a34707845

      SHA256

      005a87a76f01cc94ad0027ce202a9c9cf8a630c76f5a0da40c90831eed76703e

      SHA512

      6ff29c64bba34c873bc736be817728aad863da4eb8745f3a1596acc808a8f6a272714d7bb3c2d564a02c2a62eaf65701148006796918afd271a74c98c347c938

    • C:\Windows\SysWOW64\gfiwslxw.exe

      Filesize

      121KB

      MD5

      bbb86692347f4b0d690d113f816c2c7c

      SHA1

      be285d7976bd164061993a9e13f1e6db44976682

      SHA256

      e517413796dbbc14f6a8126f810a124f39092a12bea8e704ccd9c89ee456af41

      SHA512

      3ca7a8f1d87d8bbececbf6d187b5af07ff48b2edaefd89615a07f75b74b8472efe8fc8fbe8c3762c31e270cb083502c11bb35b939ec10305bc45c6b19f3c410e

    • C:\Windows\SysWOW64\kzqhxdvlgucgimd.exe

      Filesize

      512KB

      MD5

      82bc327de2e0113a343fbb449080e604

      SHA1

      63b0f261245c9549b7f0be9f091dbf1888dc201a

      SHA256

      6fc993131746981af632da2bc9361612f0f2f0d9df463bb02c36c338cd83c9ef

      SHA512

      aa98b1157cdbc797f8e7bca1c7d5dbe40c5dc56ee3d9ca35f5c3ccf9a784da81c6aa3d842b55eaa848406bc8104fe6f9f5f2a082fb9c63ab8bbd9efa66ccc57f

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\agiuaggrxqunz.exe

      Filesize

      512KB

      MD5

      030644e91b033125060f76d5ca27b916

      SHA1

      36e190c99dc44d596f23c73639ab7de27b573a57

      SHA256

      76554de08bfcc12c481a628bc95b9d12827450fe273e31db45c12c566a68c87d

      SHA512

      ab9595e04dd4bbd16150c28bd6d1f0099dfacf52d0128af1dbbcee81d5e1200bd09af73dace0ba28e374bb97e07efa0936f47c072e451a35a671d9c54c64fb5d

    • \Windows\SysWOW64\byoctyoycu.exe

      Filesize

      512KB

      MD5

      6fc2b9daeea88717e4ae148c95d1c5a0

      SHA1

      9a4633e68851ce833847c13fa312e3c272460e03

      SHA256

      e675bf0496895953c1972df72da935a9284e8940bd4e8098b723768ea38135d6

      SHA512

      a23f0840ba20f72894b05e597fefbad7ac17abd51f34cf1ad59bcf0ef6184668b4f835c3b3ce50f03e1dcfc427d1e34b49a5f90b338989f8a4cfa1f888b0618a

    • \Windows\SysWOW64\gfiwslxw.exe

      Filesize

      512KB

      MD5

      a7e0501329cc7c403ff2417a38c45555

      SHA1

      4c0a23c52b24a38a5f3817994fdb0f68eabb2df5

      SHA256

      d36cfc8b6a11ec26f89a03cd759ffd690fb308143705f261de8f5bb1858db3d5

      SHA512

      f80c90669d87959aa285a63881bb44eb78cfa3679fc15369aa39e814a76f877ecc44fd04785c88bdcdc1fe8dd7b981a054b3dccbae6df403af4c2949551f340e

    • \Windows\SysWOW64\gfiwslxw.exe

      Filesize

      195KB

      MD5

      69dd406e48276f847859e1d7af6fa2a0

      SHA1

      66a36996c04df245d3299c2423891bd09d7a4b27

      SHA256

      e4432ececea5bbb1b38b582baad37509dc72441ec29860600a4b98b019ecfa7c

      SHA512

      e52fe057dadc13a59ec5890918bb94b2064fd54eb9afc9a354c3bdf8054059298fe86eca650496bd73fb42dddeee58e4637ae83825321208e2602c7d5e48eb57

    • memory/268-65-0x0000000004D40000-0x0000000004D41000-memory.dmp

      Filesize

      4KB

    • memory/268-69-0x0000000004D40000-0x0000000004D41000-memory.dmp

      Filesize

      4KB

    • memory/1136-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/1664-47-0x000000007105D000-0x0000000071068000-memory.dmp

      Filesize

      44KB

    • memory/1664-66-0x000000007105D000-0x0000000071068000-memory.dmp

      Filesize

      44KB

    • memory/1664-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1664-45-0x000000002F171000-0x000000002F172000-memory.dmp

      Filesize

      4KB