Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 15:50

General

  • Target

    7a3f9c429e317fabda989e9b74efd2aa.exe

  • Size

    512KB

  • MD5

    7a3f9c429e317fabda989e9b74efd2aa

  • SHA1

    149dbee672829f6947ec86a0a9a64dbcc9542947

  • SHA256

    09f9a9776b4fa76b653ef0062eb8d6f9b12b22f887c0eb3f9062e69b11a93100

  • SHA512

    a44118b8e80d415fced8c3988c33c9387e5f7393fc05938c6c8d05a1cc64dbda215df18d107aaa60b8315d23e94e596e5c0de39a92533eaa327161c0180c310b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 48 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a3f9c429e317fabda989e9b74efd2aa.exe
    "C:\Users\Admin\AppData\Local\Temp\7a3f9c429e317fabda989e9b74efd2aa.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\SysWOW64\vtqwiapepl.exe
      vtqwiapepl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\swjgnqey.exe
        C:\Windows\system32\swjgnqey.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2632
    • C:\Windows\SysWOW64\jnvrzzedaqwjihs.exe
      jnvrzzedaqwjihs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2728
    • C:\Windows\SysWOW64\swjgnqey.exe
      swjgnqey.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2824
    • C:\Windows\SysWOW64\wbbndaesghuem.exe
      wbbndaesghuem.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2940
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1628
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      0bf54dcc5bf7cf40351df1cd7f1e692e

      SHA1

      6dc27ca37d2ab35cfb6d5841f84d9da3de8e39a0

      SHA256

      ddd4aa65563deb0b3541a7af2c52511ccf511f75b54df1b5d7653600be7739fe

      SHA512

      64c8029083cb0f734ee225d4cf59cfac1800fa67abc77407826f6c8184f2fdeac35cd341ca9f395e187e91aaf1019f6b1aba0c332ac3f1321a7b3303be0d6489

    • C:\Program Files\SearchFormat.doc.exe

      Filesize

      512KB

      MD5

      19a1d086171841e73c2f57cf08f98e45

      SHA1

      6ca1e011cf0bb075add881813c5ff085bed981a4

      SHA256

      88ab57a01e09f047ea439065348f8d2695870ab65bb2226062f89dd6ca522af3

      SHA512

      7937f37b4e9d80fe69f92d6379dae5049662e8f0d5512393e6e15bdf3f177145b32d38a7d7e1d878082c96ff907522df3590f8bce80cbda079db752346672000

    • C:\Windows\SysWOW64\jnvrzzedaqwjihs.exe

      Filesize

      512KB

      MD5

      bca43e86cc49e3cedc587a9bf730a970

      SHA1

      582d83df2ca877b2b3a0f280e63ba5f49adadc8c

      SHA256

      e20c7bd35c9eb6bc973c783b98702e083c34ac973b490e9ed42766856a0ae560

      SHA512

      60733273d8f3f60dca20b5a44849feac814589818e7a517aa17906d9534d6d70dedd27c43f05bfe0b94b9215330a9144fe6cb85c724909e6be2bdab3c9c7cdf6

    • C:\Windows\SysWOW64\wbbndaesghuem.exe

      Filesize

      512KB

      MD5

      6db51c0ec5243ef0110556a272a26c81

      SHA1

      c64fb9cc3b62e300a521116f037b1f5d9316bb23

      SHA256

      c33da8bc5ac2a4b0ed1e06fb4e1322f0145a248267960849097b6fdc7509f4cd

      SHA512

      36ff51806f6fa510113b02eebead896f9cb2101ffebd68f747fe04415ebe328d5bbbba5ba16b3d1e8ea47888b0afd105f15272459711799102b0a6422dd17cc7

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\swjgnqey.exe

      Filesize

      512KB

      MD5

      0a0bd5003e01167a58490a7064ca8a23

      SHA1

      e54153c04bc1431589920af88beb7b8e93c4a687

      SHA256

      ea3796676d3e3ccb937f3f23cf6dfb089b05cf863540797c0a3e4bce8f7a4e72

      SHA512

      6c9bd477545ea1309b25a750529dd1a338cbbcd9b961459680db064dbd8d87e3374ffb8f487d4b1d330931e696c1f3a3ed3156be6a6f8d4d9e3f18aee1e80f8b

    • \Windows\SysWOW64\vtqwiapepl.exe

      Filesize

      512KB

      MD5

      e381245453eb4e3a2ca18ce2bb67d952

      SHA1

      4effb189b53924e572384f02dfe1f280c9cfac7b

      SHA256

      e7484b5a3bc59cdef2be838a765888916b8fd3c1aafd453cfda431fd3db1d319

      SHA512

      307ffd6f232bf364866f8342f4ec5f7eb97ff15e00f0d9ea548f44c1375b76dbae552fb2284b01a586716fa3fe4c242e99d6649671eafcfdf8770573f5538083

    • memory/2404-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2672-82-0x0000000003FB0000-0x0000000003FB1000-memory.dmp

      Filesize

      4KB

    • memory/2672-85-0x0000000003FB0000-0x0000000003FB1000-memory.dmp

      Filesize

      4KB

    • memory/2672-90-0x00000000026C0000-0x00000000026D0000-memory.dmp

      Filesize

      64KB

    • memory/2768-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2768-47-0x0000000070EDD000-0x0000000070EE8000-memory.dmp

      Filesize

      44KB

    • memory/2768-45-0x000000002F7E1000-0x000000002F7E2000-memory.dmp

      Filesize

      4KB

    • memory/2768-83-0x0000000070EDD000-0x0000000070EE8000-memory.dmp

      Filesize

      44KB