Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 01:23

General

  • Target

    490af43a1ba402f98445a6dfe8668770.exe

  • Size

    512KB

  • MD5

    490af43a1ba402f98445a6dfe8668770

  • SHA1

    997e4dc71109e9f6091eb286b6ba86e27f398893

  • SHA256

    32499086592efa3a49548ee607808a74185ac96c003982cb94cb3c95ae0df74d

  • SHA512

    c6f9515c60bc21e964f4ea15b14e54d2b9500e538d11ec99bc8f08106c21c4656f2d0b6c9484130a937f71910436057d6bbd32176951c16f9433eaad11f19da3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6d:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\490af43a1ba402f98445a6dfe8668770.exe
    "C:\Users\Admin\AppData\Local\Temp\490af43a1ba402f98445a6dfe8668770.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\yfpwtybjhs.exe
      yfpwtybjhs.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\fdcpkess.exe
        C:\Windows\system32\fdcpkess.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2564
    • C:\Windows\SysWOW64\mlktfmpxihwtgpt.exe
      mlktfmpxihwtgpt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4836
    • C:\Windows\SysWOW64\fdcpkess.exe
      fdcpkess.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3616
    • C:\Windows\SysWOW64\oqgrnyrnnkwjq.exe
      oqgrnyrnnkwjq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1668
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    381KB

    MD5

    30aec9e0b33fbd99234328357879f812

    SHA1

    3c9d37139d4ccfe2b694afba9633170d0f510a92

    SHA256

    15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

    SHA512

    2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    198KB

    MD5

    454a3cdeef88969fa5cb31e54fc21e63

    SHA1

    4a710fc40a6c8ba5d1450939f329c4882a4c068a

    SHA256

    871bd8814d5b251fa5f6f6501288b3c3aa5c2a26ba692aba78c572b1882d82c6

    SHA512

    5ec73df8f6849a5545bfa695344dda62dc5db9073fc27ceaf8dd43b60b29ff39c79de7f79fad4f1cb224327713de40a926437b630f9dbbf3529d198b07c0a860

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    42033c511bcc7e1970e3c45cb786f794

    SHA1

    85fd47e439588b9c25090a0b4e80708c70652403

    SHA256

    62d541335dd2c855f8cf2c10b799aa5b4462fb9d799282a6a6acf5a747bdbfc6

    SHA512

    c121ce2191dd3d934458ca89f7c2a9b533081e0675d1deaa703539b61424a3c47b8c2138bda3b31ecfcd05c520a5a23010e4c6d6b0e2d4c629ac76b22b163b26

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4005d43714dad00dafd62c26d642d363

    SHA1

    83f388df32bedd6adc5d2037292c325cb698e456

    SHA256

    845ea31a0b47c5847b44333171cbd1e234a6f69e20c528119c960f8f33e07d7e

    SHA512

    3ded47ec307fc07c71de0a31ffeb5d01ad9e7ace8ed384490fa5deb88b5c5581e9f5d66f3f5127b67660fe978613618e9ff7171f3412ac27b6bf016d1c5945d7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c1401ff3e4d6ecfffd467f613fbd40a2

    SHA1

    da4c8a1698390936fde468d541d58047e885fe43

    SHA256

    79d39f6b4b7050b287446f5a12ff43a98545394f5f16d244f3903498227e88dd

    SHA512

    8a46e117a11d0659e86866250690fc501736128f147644c9ab83881567ac2abb7edbb50ef4b9b1bb4299e299ab0bcf6698e4af7a2f6c9a7653d5cf7ab4a87224

  • C:\Users\Admin\Desktop\OpenTest.doc.exe

    Filesize

    512KB

    MD5

    4cd8a8c153323e0f0e747d6a45be530d

    SHA1

    30c6cb94855a95784da574f37020af04e588aaea

    SHA256

    781e8c82fab53c27f542052b2e3b93b63a9cb89cba1f50deb729dd22a4f8c957

    SHA512

    0fc8d27da81ecc2553c7ba47339758a67dca34a20c4720f0f3b9d4f2fca29a737b075fef37ca1fab8dec88848276b1a95e126c51ad8ea4ba91d8a57d47718659

  • C:\Users\Admin\Documents\RemoveEdit.doc.exe

    Filesize

    512KB

    MD5

    83ab82e940e94336ed9b88ab986a6331

    SHA1

    712c11f12d15e29cb850f2a7cd70b640e82e8aad

    SHA256

    6632598633746c4056910c7c96e93419c908c99b080c4aba63cf9aa80428552d

    SHA512

    539ed0506a72670473148dc0eb7cc155fbb2eeb159b9134f721975ddaa3fc14275ab51e665ffc9b5f0325aac7fc83a31d9db054a5ad7e2c82410454449e0b6bf

  • C:\Windows\SysWOW64\fdcpkess.exe

    Filesize

    512KB

    MD5

    23b101ae77a13c0184da3bfc0d8a95d9

    SHA1

    c36d39d5408b051579b88b2a3474570de98af5ac

    SHA256

    a2e1dfa332b06546558d866f80ad8517616927cbf3344043a4843f61ac40726f

    SHA512

    133a435ed39d2fa0ba2e0ecf659d59b9938321a65ce59a6e8f7ad8aa8bae8514021166e91608c8b76a4c668106b993c8462bb53cd98aa19d5cbceebef3fc8172

  • C:\Windows\SysWOW64\mlktfmpxihwtgpt.exe

    Filesize

    512KB

    MD5

    b8fc9de78e632e2b31ba9f7e920ed0c2

    SHA1

    94953d27b14be0bdaa1eabf2a02ecab5c74fc39e

    SHA256

    d974152bacebda6d57a5e56ced83ade6a36b2e9e207a4f6d31054c96d2c5a4ff

    SHA512

    e566c08816ab314cebbc8a7c50372f00a4972aa461ab7216245fc56e12c36971983f77a5b12f1e53989d2177b191151341874816618c1e312fdc6232c60e5b41

  • C:\Windows\SysWOW64\oqgrnyrnnkwjq.exe

    Filesize

    512KB

    MD5

    dbb011840d38a2c6f549073299c6f5d0

    SHA1

    a5b2134f983d17b978f9cba949ec7121dab6964e

    SHA256

    9b5480a5b12ae700252ac28d22c01a1d3a2d6095bb7fe5ff019e5f6b426f1360

    SHA512

    93e5ca2eb009673d589ce9447634c7581a0b8f6f9408d8a79ca08d3fa4103f0c8815b09a046726d7d30bda30743c9aa421a056d54507b4fe1b969e61eac22402

  • C:\Windows\SysWOW64\yfpwtybjhs.exe

    Filesize

    512KB

    MD5

    77310b66f8487497d5b779bb2cc99354

    SHA1

    052a0c5f46ad13949be12a657ce3caedcd12e50b

    SHA256

    84bd7a3c0b6f2b27ac60a628c576aa7058db668de58e1314cb11054dbfdbdd48

    SHA512

    e7644cfbb829f403ab9585e2cc7fc062e57fd0233e84dd6fee9bb43e51ae1d03f617fcea4a33c14916541b5b90184379d7bce87204b28a2b6e13f77faebbee66

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/456-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2840-46-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-48-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-51-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-53-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-52-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-49-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-54-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-55-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-43-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-56-0x00007FFCC20B0000-0x00007FFCC20C0000-memory.dmp

    Filesize

    64KB

  • memory/2840-57-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-58-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-59-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-39-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-37-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-50-0x00007FFCC20B0000-0x00007FFCC20C0000-memory.dmp

    Filesize

    64KB

  • memory/2840-44-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-47-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-45-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-42-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-41-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-40-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-38-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-115-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-137-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-138-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-139-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-140-0x00007FFCC4790000-0x00007FFCC47A0000-memory.dmp

    Filesize

    64KB

  • memory/2840-141-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-142-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB

  • memory/2840-143-0x00007FFD04710000-0x00007FFD04905000-memory.dmp

    Filesize

    2.0MB