Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 06:46

General

  • Target

    5a9a3c0573ad6bbf8ab99941801dbeec.exe

  • Size

    512KB

  • MD5

    5a9a3c0573ad6bbf8ab99941801dbeec

  • SHA1

    7445faccb3896c4e18e0140b5a208ad5f7773e88

  • SHA256

    9586d4cb6b50068c7a98f5c8c05b3717712a7724754a491b0851f2de8ce122e6

  • SHA512

    d5c141078fad9bddcb34e8d3fa1e8a01028c7e3c107a8806a625f02d19cf17dae5349b564d613e0f0431095f6de359eab1cf4134972f32f36662ae5c4a7d0556

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a9a3c0573ad6bbf8ab99941801dbeec.exe
    "C:\Users\Admin\AppData\Local\Temp\5a9a3c0573ad6bbf8ab99941801dbeec.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\SysWOW64\rehqbdgifv.exe
      rehqbdgifv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\SysWOW64\gdwwhjbw.exe
        C:\Windows\system32\gdwwhjbw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1740
    • C:\Windows\SysWOW64\ynglaqsragsvlmx.exe
      ynglaqsragsvlmx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2228
    • C:\Windows\SysWOW64\gdwwhjbw.exe
      gdwwhjbw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2184
    • C:\Windows\SysWOW64\qtnuezbthbcix.exe
      qtnuezbthbcix.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4032
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    a94f73b6253d7e5d7b88dbfea27308f0

    SHA1

    814fbe06c682d60adbdb4aefa82944cda90cd8e3

    SHA256

    702050354860167e8d74287446c73da90326ad53229b2539245ff5c7ca5c1400

    SHA512

    d22f4bc1bb5b7f351b34b99448eb8de12ac6ee4f290574f92834ff24d779ccf68274d62126c812f9ec4387305cdd933596000b03b5a8093901db5891cc46caf1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    9a494572bfb6ac11bce4e30abd7a3132

    SHA1

    c40eb70e93a8e7641744e252d093d6ad2a4acf50

    SHA256

    4cd13cd56b1b14b745da7c7e9e16ad37bbc9764d11a91ea03b49276dbb2a439a

    SHA512

    7be03aba8921d9d1413e2d90a03ea7abde6869a951d286bbc6e908729f8fd8eab0c90643112e2440addc4a30589642769e6a6520ff32a71a426f525172f48b4d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    3c91db440e4f0d7cb749690e342b8098

    SHA1

    347d4493ed4ba3fd7ad0eb4bcc7fb34be5a85161

    SHA256

    9d07c5b955aab9841de8e5cf8d563305db4aa842bb68bed29cb5008f7c4ae82b

    SHA512

    4047138a86785ed205ccc3b32d7f649aef8e474e7be20d82e96fa0e66c5a74da4ce98fcb2082085f2a4cc185b5ddf5cc5cdd599fa5cb0840a1d431c2a5d5e2f4

  • C:\Windows\SysWOW64\gdwwhjbw.exe

    Filesize

    512KB

    MD5

    e5356b0aa1dd0244665c12b03a58c29b

    SHA1

    da9771ee1b281241253a4db1b065485750bad991

    SHA256

    65186176b59d3ee5776a7fb2ae09275154647b894b83c7dcadfeeee2d78b837e

    SHA512

    0227f923af555088cee397eb8a3b77d2fc9c4250f6ddcc02ea1e2da545b1607014b193b90c49402c893afd4f07e44ef87d975564bbc5f02d6a235655428957b7

  • C:\Windows\SysWOW64\qtnuezbthbcix.exe

    Filesize

    512KB

    MD5

    9d4f39e6a3eb8b09df362556518e6fac

    SHA1

    a8e2dd9bea1b5a51daadb8061794aa5976893749

    SHA256

    9deb09a99907b5830dea4587c1e53853915612f0101d52191f1cd927f2cfcd28

    SHA512

    c8232fa145280837a718fcac93f7b9a93beb7a6eee2c422a0a78c6fbfdab76ce08d53fa3bfaa4bc0202e35a51d1de01bbd998779254059f02bf93a8b947bb147

  • C:\Windows\SysWOW64\rehqbdgifv.exe

    Filesize

    512KB

    MD5

    843ad554b8ec530477ce3c5c03b537ca

    SHA1

    7cd8de2900dd22b0b7c581a60308bf231c700334

    SHA256

    8c97898415ee15389808291be8f249d2e25e722743a2e893b835efb5d036911c

    SHA512

    2f4ae7e40839724f469dd33e0e54ebbb0de58a5ad9f8acc464de929f4166abd7463671838295f5825440ae2250a84d8809aa8bb13ed8820ad0e04c54deeb8323

  • C:\Windows\SysWOW64\ynglaqsragsvlmx.exe

    Filesize

    512KB

    MD5

    bb94c073095e8b1f26238dc1623631d3

    SHA1

    3c41f593eec0a339f9d59b34531b4709fe8cdebc

    SHA256

    bc7c4f76f1e665bb5d18d73ccdcd56908d8547d5a108c70a8fee9d66e35e6fa7

    SHA512

    cd8762dfbc4da6ddc0f08c6980020e7bba7e634f78b0614c5ed0761e15bbd484ec020b256088143bc53a336323834a807ec6cff0897a23f1d8fb0a4f50747508

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    590bf675663ef76c333c76f1a17b38f1

    SHA1

    a38b449c8e0edbdfd95c5f914dcf894cd9382db7

    SHA256

    bcf7e6c04240224e8d4e38196765c927869d293a614aaf832ff6bcc096956295

    SHA512

    f1b71912123786cea9f514dd461a4eb3cf8e61f0474fab56e4cc098e7d00142ef895f2c48bddc3cd421807148cc9e6567fd5d284b8ada5f0b30cf599208bd5ba

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    37644cbf6bd22509e1670f2505010c1c

    SHA1

    eba50c5d43332f71afe677d28ea1e909f072f1c9

    SHA256

    a602f98b842893838562b440a21f1606df37c784e6ed2331483fd189e819e4b8

    SHA512

    778657b3c6a4be402b8d2a347937ba9a915f4b26ebeb7d7c9faac7b0940072ee6f2d319143636de96b5101f83b0fc45e3ef349153c84c584eea2a53b5c385625

  • memory/1008-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1648-37-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-39-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-43-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-47-0x00007FFDE3BA0000-0x00007FFDE3BB0000-memory.dmp

    Filesize

    64KB

  • memory/1648-48-0x00007FFDE3BA0000-0x00007FFDE3BB0000-memory.dmp

    Filesize

    64KB

  • memory/1648-42-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-40-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-62-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-63-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-66-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-41-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-44-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-38-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-36-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-35-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-128-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-129-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-130-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-131-0x00007FFDE5CB0000-0x00007FFDE5CC0000-memory.dmp

    Filesize

    64KB

  • memory/1648-132-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-133-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-134-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-135-0x00007FFE25C30000-0x00007FFE25E25000-memory.dmp

    Filesize

    2.0MB