Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
55db3a5b67a35d72f339a90d20c9e5a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
55db3a5b67a35d72f339a90d20c9e5a2.exe
Resource
win10v2004-20231215-en
General
-
Target
55db3a5b67a35d72f339a90d20c9e5a2.exe
-
Size
512KB
-
MD5
55db3a5b67a35d72f339a90d20c9e5a2
-
SHA1
e0ae31b15dcac213218bda70a20fb41da712f3bd
-
SHA256
609073641db5b2de72f72b83281e4ecedeb4969ae05836620a94b3f25c396ce3
-
SHA512
8c110f58bef1d927e47fb7b262b3d41a37d1d683d8193d5b80946112c62ae9d8cf498c9498c079c0c83c414ab1251dc39ae25ed9084dc63cd8d53fcbaaac2c40
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5q
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1776 hjngmijxsq.exe 1740 cefcqybgvbampro.exe 692 cgeiujug.exe 2980 oobhnezpsoewh.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4296-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\cgeiujug.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File opened for modification C:\Windows\SysWOW64\cgeiujug.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File created C:\Windows\SysWOW64\oobhnezpsoewh.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File opened for modification C:\Windows\SysWOW64\oobhnezpsoewh.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File created C:\Windows\SysWOW64\hjngmijxsq.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File opened for modification C:\Windows\SysWOW64\hjngmijxsq.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File created C:\Windows\SysWOW64\cefcqybgvbampro.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe File opened for modification C:\Windows\SysWOW64\cefcqybgvbampro.exe 55db3a5b67a35d72f339a90d20c9e5a2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 55db3a5b67a35d72f339a90d20c9e5a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACDFAB1F96BF1E3840E3A3186993996B389028F4369034FE2CE459B08A5" 55db3a5b67a35d72f339a90d20c9e5a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB1B12D479239EB52CBBAA733E9D7BE" 55db3a5b67a35d72f339a90d20c9e5a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFEFF88485D85199136D75B7EE6BC94E631593167426242D79C" 55db3a5b67a35d72f339a90d20c9e5a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F36BB9FF6722D9D209D0D38B7B9010" 55db3a5b67a35d72f339a90d20c9e5a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1845C77B15E1DBBEB9BC7C93EC9434C6" 55db3a5b67a35d72f339a90d20c9e5a2.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 55db3a5b67a35d72f339a90d20c9e5a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33322C0D9C2783586A3176A070552DD67CF665D8" 55db3a5b67a35d72f339a90d20c9e5a2.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 1740 cefcqybgvbampro.exe 1776 hjngmijxsq.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 1740 cefcqybgvbampro.exe 1776 hjngmijxsq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1776 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 27 PID 4296 wrote to memory of 1776 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 27 PID 4296 wrote to memory of 1776 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 27 PID 4296 wrote to memory of 1740 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 26 PID 4296 wrote to memory of 1740 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 26 PID 4296 wrote to memory of 1740 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 26 PID 4296 wrote to memory of 692 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 25 PID 4296 wrote to memory of 692 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 25 PID 4296 wrote to memory of 692 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 25 PID 4296 wrote to memory of 2980 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 18 PID 4296 wrote to memory of 2980 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 18 PID 4296 wrote to memory of 2980 4296 55db3a5b67a35d72f339a90d20c9e5a2.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\55db3a5b67a35d72f339a90d20c9e5a2.exe"C:\Users\Admin\AppData\Local\Temp\55db3a5b67a35d72f339a90d20c9e5a2.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\oobhnezpsoewh.exeoobhnezpsoewh.exe2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4492
-
-
C:\Windows\SysWOW64\cgeiujug.execgeiujug.exe2⤵
- Executes dropped EXE
PID:692
-
-
C:\Windows\SysWOW64\cefcqybgvbampro.execefcqybgvbampro.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1740
-
-
C:\Windows\SysWOW64\hjngmijxsq.exehjngmijxsq.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1776
-
-
C:\Windows\SysWOW64\cgeiujug.exeC:\Windows\system32\cgeiujug.exe1⤵PID:1904