Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 04:54

General

  • Target

    55db3a5b67a35d72f339a90d20c9e5a2.exe

  • Size

    512KB

  • MD5

    55db3a5b67a35d72f339a90d20c9e5a2

  • SHA1

    e0ae31b15dcac213218bda70a20fb41da712f3bd

  • SHA256

    609073641db5b2de72f72b83281e4ecedeb4969ae05836620a94b3f25c396ce3

  • SHA512

    8c110f58bef1d927e47fb7b262b3d41a37d1d683d8193d5b80946112c62ae9d8cf498c9498c079c0c83c414ab1251dc39ae25ed9084dc63cd8d53fcbaaac2c40

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55db3a5b67a35d72f339a90d20c9e5a2.exe
    "C:\Users\Admin\AppData\Local\Temp\55db3a5b67a35d72f339a90d20c9e5a2.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\oobhnezpsoewh.exe
      oobhnezpsoewh.exe
      2⤵
      • Executes dropped EXE
      PID:2980
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:4492
      • C:\Windows\SysWOW64\cgeiujug.exe
        cgeiujug.exe
        2⤵
        • Executes dropped EXE
        PID:692
      • C:\Windows\SysWOW64\cefcqybgvbampro.exe
        cefcqybgvbampro.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1740
      • C:\Windows\SysWOW64\hjngmijxsq.exe
        hjngmijxsq.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1776
    • C:\Windows\SysWOW64\cgeiujug.exe
      C:\Windows\system32\cgeiujug.exe
      1⤵
        PID:1904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4296-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4492-39-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-44-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-47-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-50-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-53-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-56-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-58-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-60-0x00007FFE9A4D0000-0x00007FFE9A4E0000-memory.dmp

        Filesize

        64KB

      • memory/4492-59-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-57-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-55-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-54-0x00007FFE9A4D0000-0x00007FFE9A4E0000-memory.dmp

        Filesize

        64KB

      • memory/4492-52-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-51-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-49-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-48-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-46-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-45-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-43-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-42-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-41-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-40-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-38-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-35-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-131-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-132-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-133-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-159-0x00007FFEDC4B0000-0x00007FFEDC6A5000-memory.dmp

        Filesize

        2.0MB

      • memory/4492-158-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-157-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-156-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB

      • memory/4492-155-0x00007FFE9C530000-0x00007FFE9C540000-memory.dmp

        Filesize

        64KB