Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 13:28

General

  • Target

    7275c4f3b872ee1d583727624dbd043b.exe

  • Size

    512KB

  • MD5

    7275c4f3b872ee1d583727624dbd043b

  • SHA1

    e2739fd3d118d7cb76d9aa11ca146fba08b10d5e

  • SHA256

    1adcf3655481103f075d482b6ed17c6544da44cb7eb486223f7bfcd777178ab3

  • SHA512

    082ae250534c033f94e5ede6d7e330d4dd5b96d4140afcae0b3aa756c737714e8e471d21755a424c5fdc8a78e0da3d6cc448deb95ecad1cadcfade43a3a3f06d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7275c4f3b872ee1d583727624dbd043b.exe
    "C:\Users\Admin\AppData\Local\Temp\7275c4f3b872ee1d583727624dbd043b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Windows\SysWOW64\acdlqtzihd.exe
      acdlqtzihd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Windows\SysWOW64\eqwzmzhh.exe
        C:\Windows\system32\eqwzmzhh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4792
    • C:\Windows\SysWOW64\xbhdtuawcpjwtme.exe
      xbhdtuawcpjwtme.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1936
    • C:\Windows\SysWOW64\eqwzmzhh.exe
      eqwzmzhh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4556
    • C:\Windows\SysWOW64\bhjulofugypfd.exe
      bhjulofugypfd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1672
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    fe8f9b64b875a428978b144dc93812e3

    SHA1

    ae59cf61b4b1d2f03ce40759d7796f601fae18e1

    SHA256

    4d94809a4a80a15a23c4561c5e5a919d59af4552582d5a84e13b70c58d8ba256

    SHA512

    2cb337b426b142c1ca92d54583e7a23cd88f83d34eb675f6d21b81c82a6f5523f0e64ab8ff7e6d8d1bd741a6f58005df93c186fb0db066070852b5234a58c02e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    f016246948422f15a921f63b5c2386d7

    SHA1

    444b514ae4491def1ea63ae35730da6778867019

    SHA256

    dcc04325c4b672aff41990f6e7237f754abc12acb511500a94c3f3c29c86d783

    SHA512

    454a8401aab4670c7786db3a0ad5d76502a410185d447ca76e98682cea2e1fa20cb5b83eef4798ab19a0899f8a996501b4509753b9a73a2c100750e68f9c7c3d

  • C:\Windows\SysWOW64\acdlqtzihd.exe

    Filesize

    512KB

    MD5

    87e9e11eb78b1b44b997ab416ded450f

    SHA1

    4a0c739fb56380de9adea9bf408807266ef44ba1

    SHA256

    ffd7d1eeb13c7da4e914afbdd4be943aacb3ac1f62a59f120a3016de8b72d862

    SHA512

    a71fc045c91a498ed57fc960b4f2668b6d9617523c9d556c985a3fdc5fbf5ea5106430573e5f516c74374bc0540a96203857fd53be3fc8c3add499927fdce8e9

  • C:\Windows\SysWOW64\bhjulofugypfd.exe

    Filesize

    512KB

    MD5

    70ba3605ed372442365c1b1ac94c5f06

    SHA1

    707632bb167fe95cee2974368a326c40db0ce956

    SHA256

    faf9fd593ee25ab6b69270c539360bc1cd4431185cd320c24e857f99ad758cee

    SHA512

    f912d443c208e9bec2ed9e57c101143f26bdc7b5caead0183b57e7bbdb29791cad06a7b9843f72d0575a1827ed95c983848fc853b6f07667691b8baaa7521f47

  • C:\Windows\SysWOW64\eqwzmzhh.exe

    Filesize

    512KB

    MD5

    d97f2021a1898e2cb7bf8bffbf5d4a0e

    SHA1

    f8ce6d0348cde54bddb60823a0aa26da31a0dc30

    SHA256

    e2e152da59a2335b56bae5c85b27b104cc669087b58b61aefc3aff19d64e2d97

    SHA512

    8d9f8cb4d2d89e02b3824db2e70d898652a52ecbfd9bcfd571151481021de62a33f33bfdff1fa7edd47cac757fd83c129e550005e26136f0f4c313accb7733d0

  • C:\Windows\SysWOW64\xbhdtuawcpjwtme.exe

    Filesize

    512KB

    MD5

    6c469ee2d130673ec09d84ff84edde2a

    SHA1

    c165890771c51853614149b4d79f0e69f9acd9ec

    SHA256

    c91b17118ecf66803be22cbf9f10a0114e0c864186965a5f1f290e154df3c8ea

    SHA512

    01c69de33a5d403b776046fb91794cafa4fae0fb9497c02eac94f06158414640ccefb4c756a7c285ae66dac84e01275796fb6c2501dddd02e38052a61d2adb3c

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    9a53967e04f5c91927d5cf22ef3e596e

    SHA1

    5779a08e543edf6d07a5b58d2cb1cd5bf5ed9259

    SHA256

    1a1c818b63fb80fe9add569cf1e8523c05b31d1575e937550967ecec09e8f96c

    SHA512

    eca28fe453172074da0fec50ff8417d17a85ed33b3cd837d277e0bdbb9145c9bd03160aed19fc2c98f3c7855a2a33bbe267cdf7869c0a0448d75da796f3d1fd7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    35ecf2dd96ba099bc6615646d8aed9cb

    SHA1

    b314387fbcddcd9d30527cedf1deff55a4e9eb02

    SHA256

    9b9065ae63418f63f10d5aac3236b0a55f171ed6aa38b2eafdc85b2347b00002

    SHA512

    d44ee9e4a815abca09099ddd7e13774702a5dcf25acf7a6b472c6a7303969718a62f832c0f1332a7d5a5ea581b2fe7aa3b9e0d9ca60c67302e5e1c7b4c6ab757

  • memory/3204-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4056-46-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-36-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-50-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-53-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-52-0x00007FFE9D3B0000-0x00007FFE9D3C0000-memory.dmp

    Filesize

    64KB

  • memory/4056-54-0x00007FFE9D3B0000-0x00007FFE9D3C0000-memory.dmp

    Filesize

    64KB

  • memory/4056-51-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-47-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-45-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-44-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-43-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-42-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-38-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-49-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-48-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-41-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-37-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-35-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-110-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-111-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-112-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4056-137-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-136-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-135-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-134-0x00007FFE9F6D0000-0x00007FFE9F6E0000-memory.dmp

    Filesize

    64KB

  • memory/4056-138-0x00007FFEDF650000-0x00007FFEDF845000-memory.dmp

    Filesize

    2.0MB