Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    14s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:28

General

  • Target

    5fd1ff1d035c67c382afa55817ac6f40.exe

  • Size

    512KB

  • MD5

    5fd1ff1d035c67c382afa55817ac6f40

  • SHA1

    9126223a8d4f8a5541a1a200c4d3a71610a41a82

  • SHA256

    0158b219726d86f4fd078dc12c0b4276028ad604ce0903947034dc3c88b856e4

  • SHA512

    468b4abb8715bfe787e1e6ee6a869543fef2baedbea8a350e5a65583a973a701c3b182eda8740c8627b09b6efe7f1b200b1006ca65df60e6a96b6bce7c04e29c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5x

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fd1ff1d035c67c382afa55817ac6f40.exe
    "C:\Users\Admin\AppData\Local\Temp\5fd1ff1d035c67c382afa55817ac6f40.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3144
    • C:\Windows\SysWOW64\smrbsavggsldg.exe
      smrbsavggsldg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4360
    • C:\Windows\SysWOW64\ndydbygf.exe
      ndydbygf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3076
    • C:\Windows\SysWOW64\xpgcwaqqvwnnvxm.exe
      xpgcwaqqvwnnvxm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2628
    • C:\Windows\SysWOW64\gsyzzvjubk.exe
      gsyzzvjubk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1668
  • C:\Windows\SysWOW64\ndydbygf.exe
    C:\Windows\system32\ndydbygf.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\gsyzzvjubk.exe

    Filesize

    512KB

    MD5

    ad03e41dddaffa499273873e8c76bf37

    SHA1

    5dfb2fd1e9e554dfeccddb0fd12094bc1dd58d15

    SHA256

    b3cf44cdf20221a68ea019a156aeaccca48e3dc650c37f0e9c36f3bf614d196d

    SHA512

    2afb67c7991fe53473fdb532a488916b267f36b7f5ae039bf6e3f320c1466363730f3df1f96ebb1741b15e114cad1d331f6b7a21853599ee10ac7a744c55a568

  • C:\Windows\SysWOW64\ndydbygf.exe

    Filesize

    375KB

    MD5

    e1f7b6be9e636b11c3951989b87bad5b

    SHA1

    90f49c20dcde2672173aae81f917d38be38f37e0

    SHA256

    36870ea33766370dc0a510433bf11c147a565ec01bb679db97f06a725d2a0f33

    SHA512

    05210c877e30f9a8d1ae0afe4a8ffdeea62d4e789b2c23ad01568d7b4e6654a58ef413b3198cdf294ade860076ad65dd684f20f6a67c7360f8f981f3885d38ea

  • C:\Windows\SysWOW64\xpgcwaqqvwnnvxm.exe

    Filesize

    512KB

    MD5

    7f370884a8e99fdaf4f226e4ecf930ed

    SHA1

    3b0cbb44d9bb57c95cf63c390e4ae081f5ff7903

    SHA256

    fe73079eeba6018fa7c9f3d82e450796473b7957bf63cbf28d60542f481f1a66

    SHA512

    58ed7b3acbc233bb2d7ff997c38682d5aa7fbd9ad8ad3dc544efd06ea47c61c7323e9067f12f799656889478d76b9854ee37fd34c3bf9b6ca326fc502b9d024f

  • C:\Windows\SysWOW64\xpgcwaqqvwnnvxm.exe

    Filesize

    93KB

    MD5

    257f28bd5bdc2b725434b7ab570814e7

    SHA1

    972446e0f8d210c5d6f42a57a921391a236d564d

    SHA256

    d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

    SHA512

    c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

  • C:\Windows\SysWOW64\xpgcwaqqvwnnvxm.exe

    Filesize

    99KB

    MD5

    7fc6cf931da79ecd4267f22c6a1aefa8

    SHA1

    913682b9a75a4089cc18ec25b28e082916a6b314

    SHA256

    2672445b36639d26c7bcf277704d7f634ea7a6f4eac634027b98fb3f94062487

    SHA512

    272947751145ba29cbfecc6fe73cf5e20cf017c8c436a8af45198499e8b34c5f70215c3d5f21676a2a5de87616e85aa12b5cf0e263d57042e4221f7e12d81eaf

  • memory/2288-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3144-47-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-41-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-46-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-43-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-49-0x00007FFD82510000-0x00007FFD82520000-memory.dmp

    Filesize

    64KB

  • memory/3144-53-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-54-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-57-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-59-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-60-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-58-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-56-0x00007FFD82510000-0x00007FFD82520000-memory.dmp

    Filesize

    64KB

  • memory/3144-55-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-52-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-51-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-50-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-48-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-42-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-40-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-39-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-37-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-36-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-35-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-38-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-118-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-119-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-120-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-144-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-147-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-146-0x00007FFDC4D50000-0x00007FFDC4F45000-memory.dmp

    Filesize

    2.0MB

  • memory/3144-145-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-143-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB

  • memory/3144-142-0x00007FFD84DD0000-0x00007FFD84DE0000-memory.dmp

    Filesize

    64KB