Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 11:50

General

  • Target

    6c291243393d267250d505ba4c27195a.exe

  • Size

    512KB

  • MD5

    6c291243393d267250d505ba4c27195a

  • SHA1

    7e83b699350852b83ea9a64143a3e1ebb958e677

  • SHA256

    d74b4718c7a0600e9b5194f97ce96acffb96da0c7dd55da02fb5fee051e29ade

  • SHA512

    dd9a19f454add4c7b2f3ddaa4804afee65e68e9409142cb8717ddd0ee80d59e54f3eb458c05f62fafd6d99439e5d04ab7675c6ba76781cb9ed3f15d8ed2e9202

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6K:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c291243393d267250d505ba4c27195a.exe
    "C:\Users\Admin\AppData\Local\Temp\6c291243393d267250d505ba4c27195a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\ziesmjadlo.exe
      ziesmjadlo.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\ksblqgwc.exe
        C:\Windows\system32\ksblqgwc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2032
    • C:\Windows\SysWOW64\ksblqgwc.exe
      ksblqgwc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3052
    • C:\Windows\SysWOW64\mnjnmbdvkopoh.exe
      mnjnmbdvkopoh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2364
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1200
      • C:\Windows\SysWOW64\etgsklsrzspmwgv.exe
        etgsklsrzspmwgv.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      68c730e0891c22eecc0e07789d627482

      SHA1

      52a22bd62c2b996c3d2b8c591f2d356a8af5fc3b

      SHA256

      1ce8a15bb4f586dc942b178467791951f018c45de4fe05d5dad10d18e182a86a

      SHA512

      eb409651a711677671fbb0f2392c760840bf5cebad25734d6e44419f90d8d0d4cf63b58d7a05dc0a9004cdd75c0908750aa0d51df5470c1545b1d9b5fa773659

    • C:\Windows\SysWOW64\etgsklsrzspmwgv.exe

      Filesize

      92KB

      MD5

      6662b185f19fbf697c56a25c92de7961

      SHA1

      0df0c0df0de3724258df2549c583e3c934aca726

      SHA256

      c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

      SHA512

      c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

    • C:\Windows\SysWOW64\etgsklsrzspmwgv.exe

      Filesize

      512KB

      MD5

      ec569e996871a580e67c256f40dde7c7

      SHA1

      0311d8ee598f67479229038c86566e8f80358edc

      SHA256

      034b66da9828fe05aa184c79b48b14e0ebff2d9f33aab2102953a3862057bbb1

      SHA512

      5be00a79e987697d660d3117e614e81d31525576e4763d56bac0479959b4bbc3e2fe3fae73898d73124d783302a61d322a37a427f318400f0bdff519b2b40049

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\ksblqgwc.exe

      Filesize

      85KB

      MD5

      27623bf17711551baa843bbab18a4b07

      SHA1

      2d6d50bab42c5defdd9bdf3f14fb826853558392

      SHA256

      6a2c1908feaaa4585f579f19881c7fec6c64bfe38500306f55eaeb5fa0a7b368

      SHA512

      53f01abdb0a6c91cedd6e7bb705ad27f9dfc89722bd6bb07ad9df87ff00ca5c9fc6764706ab6edc018fd90f519cf4d12af670416b3fff7cee5e6aca87e9f153b

    • \Windows\SysWOW64\ziesmjadlo.exe

      Filesize

      512KB

      MD5

      7c3da7d3b7fdfdef305f8353ee769bf7

      SHA1

      5f138dd89c422016b0580f88ac49e42d17240d4e

      SHA256

      783cc268a0883ac34b258cfbf89f3eb59eef1a52f58e1b62535c42f0c48e66d1

      SHA512

      57ad5b90c45bedca20f89863c50043bf387bece0033b6f0cc26d546e14a9bfb306e222baf6e1de0aafe2fdbd45d45490a46cb1cb54928b8ec34bb3100e0bbcaa

    • memory/1936-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2600-45-0x000000002FAC1000-0x000000002FAC2000-memory.dmp

      Filesize

      4KB

    • memory/2600-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2600-47-0x00000000714CD000-0x00000000714D8000-memory.dmp

      Filesize

      44KB

    • memory/2600-74-0x00000000714CD000-0x00000000714D8000-memory.dmp

      Filesize

      44KB

    • memory/2600-95-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB