Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:18

General

  • Target

    5f3ca048a2b085e7ab53d25f2f565682.exe

  • Size

    512KB

  • MD5

    5f3ca048a2b085e7ab53d25f2f565682

  • SHA1

    eaef69141dc9a347dcb9af36d8afc1e57e426c02

  • SHA256

    c93dcc55a1620214857eb4862bc0467424047ff13ede76e9414e5b3d1e968845

  • SHA512

    b60b936b9172ae56f610599c554961865c01baf2617fb89dcd474f14c8503a9ad0ac5aa63cb31bc410bd246909e1a4d72efd16f84e9234553cd2c6fceac233ac

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5E

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3ca048a2b085e7ab53d25f2f565682.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3ca048a2b085e7ab53d25f2f565682.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\SysWOW64\jdkvrrrzoq.exe
      jdkvrrrzoq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Windows\SysWOW64\wvbabdme.exe
        C:\Windows\system32\wvbabdme.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4880
    • C:\Windows\SysWOW64\ilrnvqxbrjrfqoh.exe
      ilrnvqxbrjrfqoh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3772
    • C:\Windows\SysWOW64\xvaledsfdirpr.exe
      xvaledsfdirpr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1604
    • C:\Windows\SysWOW64\wvbabdme.exe
      wvbabdme.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3480
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    23KB

    MD5

    9e43673374e639c2bd1bb8579d5059da

    SHA1

    c12064d0145f7c03baece4a21bea31385ddc17b9

    SHA256

    4fedb9ba2b3cba9e9d50ba4e03bed726614f4e65aa4fc6b664c96fd136bc4d18

    SHA512

    02c7a5629b37cd920a2a24ff9c3f94e09560b29ea6e13525b80e6e73db430d12ca5661334a98a017d9dd06e1af2f01a568cd196c492644d9113b90625d91a67a

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    65KB

    MD5

    6b6e0807898630971901cb90a1bc484c

    SHA1

    a447037d27bb21212749a2c3e1794c4e81bee237

    SHA256

    b108d889dcd0f3d4138f83e2951c6c4f771fc3e041ad65764378c227e86824c2

    SHA512

    dcd022ae182eebbe9857b346842c981c22fe9b210a6439825e79c3ff0ab151d904e7c9aa84d5b68a85c1bc3e59d18fe59523f14fcce8ce6532819425c9c79d19

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ebcb6d53aea722dddb4dd73862c2d57d

    SHA1

    fc8bff158f9e9fc805ed437dc2774f15ab061def

    SHA256

    34a6717d6f7369e04fab5c9602feaed90d26cc05da29729ce01c7e1e06fff642

    SHA512

    873d1b579ca9fa4600fbda75fd2d9370acf63681d3d6af1c36caca4ef8c318e36e39ed5e3a6fe2681f9985bb3aa570ad5fcbe7fd40f5d0a1b722658e7c4833af

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8157071080ee4ee2b47c08331a88855f

    SHA1

    6494b9e6b9a2e56b4546a0014930bc7848824206

    SHA256

    a20a0d9b0363bc9ba599d2542e2c40192356aab38602e225023852f7a53966af

    SHA512

    c8c034b1f60e6c5c06f0497fdc9437e70684e8166f182e03b0835ed367684f30b09263c774eab72ef2018408cd8540ae4efc4d97e8878e91f76c81baa1104baa

  • C:\Windows\SysWOW64\ilrnvqxbrjrfqoh.exe

    Filesize

    75KB

    MD5

    62efcee5a98a9e7123cf0273e5a10b1c

    SHA1

    a8fcbc45cfe2d785326ea61d9e5d808793bd2eb0

    SHA256

    e723bb090de56fe181d5711459e647b95a9195a32ffea1230a9f0fcb4c1da3d5

    SHA512

    759afbb03690ac147c311ae580f911371e5a727189a716fea204c5888460c0caac6419657f8beface7e9465bf4b9ef159e6f839e14325e70cae8135051978abb

  • C:\Windows\SysWOW64\ilrnvqxbrjrfqoh.exe

    Filesize

    60KB

    MD5

    683e7fc0831cb6e6061e5a967f6ca1de

    SHA1

    8f7b81800f18e5c6c8138980329111cf9a2cf4e2

    SHA256

    47a64a002237eea50989a464db29fa7e665fc3a0a8dc33ee006fc648b198a6ad

    SHA512

    b9d450a61f09615d02b97af5a01f48c6110a2ad8afa8df765bf09a0996e4eb2de14bba733ea2abed97f4d4e23f0bf5a0045172acde2a2964c43f5d3474e60b32

  • C:\Windows\SysWOW64\ilrnvqxbrjrfqoh.exe

    Filesize

    45KB

    MD5

    72e54d1c3ebe6372cd193c4f6f9af9bb

    SHA1

    edb2318c68147ff855fcfc82f3b0e0b86d087eb8

    SHA256

    dad84255c14d17d513973924f6317bf58329456f15e50b28d9732c935969536f

    SHA512

    5ed912a6521b987c0b30eecbd2018bf4b40877b0cc4ccfba6e5726b36b861f159a85829bfe748d8295085d11b3d99c4d209d0dcf8df1703384e7f1194a950282

  • C:\Windows\SysWOW64\jdkvrrrzoq.exe

    Filesize

    26KB

    MD5

    6a8fdc8f1029e115e23c41f96e2afb8e

    SHA1

    05d431514219bd6137628eed6d100b2c358b3c68

    SHA256

    d92ed3a3963a0981d3cc10042f0ada01a552d2209ef3d7646c52fbfb78f484fd

    SHA512

    04d1b4ef456d1a81c985b95657800b4f4bfc55915786afe0776022ee198dac21a571a09eab602cea0072352e87d91c66f67f35dbf32e56f4391f41b2829ceed4

  • C:\Windows\SysWOW64\jdkvrrrzoq.exe

    Filesize

    44KB

    MD5

    bd0f2031fefc60891d8e877d8ceec794

    SHA1

    da38e5c166e79014813d033d1c13aa6b767f9974

    SHA256

    fbf31609a4a28f09ee11106a7cc630de6ce9b5862b98639187955242170b8f3a

    SHA512

    e1af92eaa7c0fd8a862f39045e664c79ea69fd020cbb9a68b1273a9245b27996c227ff2c651dbd84bfcb563fc84f6f9297bc05f57fef7786fc453c0f29d7169f

  • C:\Windows\SysWOW64\wvbabdme.exe

    Filesize

    52KB

    MD5

    d3fa02976570f112ae1e40388cd1b236

    SHA1

    8fb7a7510f5dd5c89886c748dba68a3930ac9e5e

    SHA256

    84b37ac9d4740e2be74a3117ff55f3af3bbdd280524856bbaf91241a2d67bb83

    SHA512

    e9e4dc615a1b17db9b0ce525c1b5308d1e9dc1e88f68e17f2f7cff7dfe824b790a635b0bfb712a809b2870249fd44858c05c659a4c69d4d281b45d8df79647aa

  • C:\Windows\SysWOW64\wvbabdme.exe

    Filesize

    41KB

    MD5

    3134125cd7a23a8ebd2551fce85471d0

    SHA1

    d0daf483708d808ef96603904dbbcdd41375badf

    SHA256

    ab0bbe12c8af1723b98d5036f0b60ed8fb8ddb62e3441e72b2a8fe2b77c9db79

    SHA512

    a3bd3ec6c0285042a175575132ff5b0d4c5a367a3b2f97c5e5aa2f4e44062614340c49e90baa3b716b44421ec1e841a79a34af21a25d9d69cf6eebee18c49a5f

  • C:\Windows\SysWOW64\wvbabdme.exe

    Filesize

    32KB

    MD5

    fac2a8b70376722b183238f5d3c6ee81

    SHA1

    5859e0f21cdf7a4e1d919f67b806a098cf14bff9

    SHA256

    7d682034410940efaf35a318d0f5cc1104912da2a0665bd1f7e5201053ecf1e3

    SHA512

    ab079039170884b57dcf3435dc2189a36f660562eb2bbc9c3475f83c9ff54fed27b089e1e0ccc6432e7cd9f9cf315a85332090243c0a95d127fb5173c52fd67c

  • C:\Windows\SysWOW64\xvaledsfdirpr.exe

    Filesize

    46KB

    MD5

    e7778e1792b8f3c7cbaf752848fa5b55

    SHA1

    59917309eafb739f1293ec6fcc202103fe34b24a

    SHA256

    a3e0ce9bddf7b5a4192d572b5f2362ba3a75c5fc859754412340a5a04a11e2c6

    SHA512

    39b1ce26e28b94bd572e1d42f417167924ff7bc5a421bb3b5ac4cad8e8e965142f56a9b3cec8f0d7b3c0a82ba79e73afa4f3ae8083a2e5ea2f0004eb7bcb8a22

  • C:\Windows\SysWOW64\xvaledsfdirpr.exe

    Filesize

    40KB

    MD5

    bc02573aa2c319b70dcb223e23401abc

    SHA1

    f2dc710e84bd84ecc68acd57e523b26421043020

    SHA256

    b7fe26f9e6c1e3b15f87339e04a2f45bb09b1966838b2566c997b11148f96f36

    SHA512

    0a2a5fe57e9398065ed752162a5e5f74a04451376086bdff464cc89a05f9e39c4692db1b6c8adff0010460efb2038c79bf7d7ab25a2e113b056bbfe546676930

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/1408-47-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-37-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-50-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-49-0x00007FFC4EF10000-0x00007FFC4EF20000-memory.dmp

    Filesize

    64KB

  • memory/1408-43-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-44-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-42-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-40-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-39-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-38-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-52-0x00007FFC4EF10000-0x00007FFC4EF20000-memory.dmp

    Filesize

    64KB

  • memory/1408-48-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-41-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-51-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-126-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-46-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-45-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-97-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-119-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-120-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-121-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/1408-122-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-124-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-125-0x00007FFC91250000-0x00007FFC91445000-memory.dmp

    Filesize

    2.0MB

  • memory/1408-123-0x00007FFC512D0000-0x00007FFC512E0000-memory.dmp

    Filesize

    64KB

  • memory/2576-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB