Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    174s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 15:50

General

  • Target

    7a3f9c429e317fabda989e9b74efd2aa.exe

  • Size

    512KB

  • MD5

    7a3f9c429e317fabda989e9b74efd2aa

  • SHA1

    149dbee672829f6947ec86a0a9a64dbcc9542947

  • SHA256

    09f9a9776b4fa76b653ef0062eb8d6f9b12b22f887c0eb3f9062e69b11a93100

  • SHA512

    a44118b8e80d415fced8c3988c33c9387e5f7393fc05938c6c8d05a1cc64dbda215df18d107aaa60b8315d23e94e596e5c0de39a92533eaa327161c0180c310b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a3f9c429e317fabda989e9b74efd2aa.exe
    "C:\Users\Admin\AppData\Local\Temp\7a3f9c429e317fabda989e9b74efd2aa.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Windows\SysWOW64\gxqbajtmmq.exe
      gxqbajtmmq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Windows\SysWOW64\qcvdetwh.exe
        C:\Windows\system32\qcvdetwh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2244
    • C:\Windows\SysWOW64\qcvdetwh.exe
      qcvdetwh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1612
    • C:\Windows\SysWOW64\hsbfvxllijzhpdr.exe
      hsbfvxllijzhpdr.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3888
    • C:\Windows\SysWOW64\hnacvjhqxfznv.exe
      hnacvjhqxfznv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4908
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    39KB

    MD5

    569e1bb558dbf660cc4cf6aec367d1c3

    SHA1

    f67759fe206f5aba815a144bf5c22b21e9ff50e2

    SHA256

    f12f334dfaa90cff48658f773b41f97f4eedd44aa782f78b300463e04b64d0ca

    SHA512

    66225dc721b279aee688b3638620c67074e98dba0fac88f921acc030c423b39ad30c2ca478096eaf920e15e4659f2d50c76a1f938765128888dd48b84fd0c69e

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    100KB

    MD5

    4998ed4037f562c39e52a05aa11fd1c4

    SHA1

    99409ea2b6cdaff3aaee1fe52c9fb50f908aa563

    SHA256

    acaf0c244c665ffc132fd8745cd19514c7a6a9bbb3fa410eab095adb2dfb7cd6

    SHA512

    a28469c29417dd9452eb083bc21b50940d0840859b60fe78096a14f7f36145de44408fd41f10d387cdb4473c87ae4384ef8d2dbe4159be1bcc188ca1bbd136ab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    d121a59086ddfd79d4bd69e4fa02a3f3

    SHA1

    1543c9ac5238599aa53426abf7c387a9d2aafa3e

    SHA256

    de2a9e96cf7d7809fe62bfeef1ab5f49aaf53611ebd796d5e7a0da251620de4b

    SHA512

    af832f2ecea1fed7016b68b9df432c67f75fa2397523a1325927189a936b1f0d1635e4ea8b0f6ef7a0414f21a64e354ad3368f065ae5eae2e7456848f1043b93

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c34e2fe9023f10e58fd611c217b5c84e

    SHA1

    15559d59d98fb4d4750b840ab0dcfd87bcc9e4a0

    SHA256

    154abf97903aafff6ca50d50e8f85d5cc9581c25a3ae21b03db84ee14807f505

    SHA512

    18c6e36d65e4361526bae72a604fea487bdc4e8bb0ce427e7223ea95e3f52e69f9be71daadb79f2b0cf954dc64baee40e140930be1d935fca0d6471f3568947e

  • C:\Windows\SysWOW64\gxqbajtmmq.exe

    Filesize

    512KB

    MD5

    6f08905921832020c3b5527c17e78206

    SHA1

    6c4b25d19e0af503830d911c1b593d2a6db7f6c1

    SHA256

    bce2114e3dd0e895aaa70c66e3660f93e81a880423c3ecddb271216a686a81d8

    SHA512

    99f36c3a343ac64453e2af7b96a132c6af93f464cc2781a8cd61a51c5c315eae2e6779eb137c4fad715c437dd1f0e222bce980a47655385a159661b0d59c7233

  • C:\Windows\SysWOW64\hnacvjhqxfznv.exe

    Filesize

    512KB

    MD5

    46d493c77f19b8566bd1cebcd27121da

    SHA1

    497c59d9b3feb75f1928e6d8224206b4fb692cc0

    SHA256

    95d931fdea75ebbbed9d135c8a2d0c62feddc373f994f6a727593f75f6bd60b8

    SHA512

    34441d93ff45ed2504f4da6cc329455adcaacc264b2c816bda3d6be52e8074845b88875c3143fb3390cf3cf5e0ccdb4dbc4e4d5b39646447b0ad85790f8e805a

  • C:\Windows\SysWOW64\hsbfvxllijzhpdr.exe

    Filesize

    512KB

    MD5

    2bcf531e1779be83673731ace6dedc52

    SHA1

    d8880884ee70d5b8e2883b9bf9868c89ac94d91f

    SHA256

    95bafff75828284134ad4b005094c4cec2032acf8c5d438fffb4f1e1b44297b6

    SHA512

    9954f33b652ce0926a801e441a052be9556618d2e76b02eb31a5ea712101447aee6ccc3a80b4f83447248df1ef9cf22329bbd201eaf3f45efcab490b592b4e34

  • C:\Windows\SysWOW64\qcvdetwh.exe

    Filesize

    512KB

    MD5

    52808bc04c22a9b397ec80c04ef0664b

    SHA1

    0b6c3e077f175bdfab5d14041d12ef9c9f62f786

    SHA256

    6acbdc55f461efbda07f9c34e344e9598090cce7e4d6897f71876351dc55f56b

    SHA512

    bd98b2c4c977261244203cca4fc5bf039daa90c1d625c204db587f015fd0922e5de5a61ad9b7f1497f12490359ce18a8a68bb3c0cf69ff54522a973ca8855fe8

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    98a04fa482273527a034f2b80e244248

    SHA1

    dd486f50ad11a4a54c12c3ac0b45df28e66d3b72

    SHA256

    63febc8794b170817aeaee2acdaf012e0e1ab6bbbb4b9d708f20ea71d7f8531c

    SHA512

    c027d67adc8f5060866f1e54e37f402094032cb3ce8120f725a6659a1bf13e4bfe70e0768bdbcb2cedbfe1eb1fdc59a5c06d00f1609eca444305e75c44ba36dd

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    eb4cb514d33ef022f56e47fe3bfeddcd

    SHA1

    b0c8df2bb56c2ad63190a8cec66b7e51ef55111b

    SHA256

    3620f5ff0ea2877864b9990c7200c4ac04b42214da9103db6ebd71de898d078e

    SHA512

    18eea2a0c06df5bee8178f2d2c091260ed83e87fbab2eb889f02ad2eac9108f9841399bf804e85b35273a3da9d6afec2399885e5f77608e6f62c26fb527a5247

  • memory/4092-51-0x00007FFAD6260000-0x00007FFAD6270000-memory.dmp

    Filesize

    64KB

  • memory/4092-37-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-46-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-47-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-49-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-48-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-50-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-52-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-137-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-53-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-54-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-55-0x00007FFAD6260000-0x00007FFAD6270000-memory.dmp

    Filesize

    64KB

  • memory/4092-44-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-42-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-43-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-41-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-40-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-38-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-89-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-90-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-92-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-39-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-45-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-131-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-132-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-135-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-134-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-136-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-133-0x00007FFAD8350000-0x00007FFAD8360000-memory.dmp

    Filesize

    64KB

  • memory/4092-138-0x00007FFB182D0000-0x00007FFB184C5000-memory.dmp

    Filesize

    2.0MB

  • memory/4308-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB