Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 20:40

General

  • Target

    f6a4d029848f1dbd3e65bb17bda6adb0.exe

  • Size

    512KB

  • MD5

    f6a4d029848f1dbd3e65bb17bda6adb0

  • SHA1

    9be29494c6831813e163df5d74b7418aad96883f

  • SHA256

    bf245168c48bdea701a7746daf24d2aa83432f36ef7b3cf7c5491b297b81ced0

  • SHA512

    85141fafdb6cb0b4ba15e93b3f0a8ded0c06e660be605c1481df8943007aa94eff40a289643a3d23ce621dde33a9838fcfbdbe1968d43ff30d4f33f8a6b875e5

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6n:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Q

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6a4d029848f1dbd3e65bb17bda6adb0.exe
    "C:\Users\Admin\AppData\Local\Temp\f6a4d029848f1dbd3e65bb17bda6adb0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Windows\SysWOW64\torwgtdmzk.exe
      torwgtdmzk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Windows\SysWOW64\lzksoszx.exe
        C:\Windows\system32\lzksoszx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4688
    • C:\Windows\SysWOW64\wincoqiqdxcvnfz.exe
      wincoqiqdxcvnfz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1300
    • C:\Windows\SysWOW64\lzksoszx.exe
      lzksoszx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1148
    • C:\Windows\SysWOW64\hhqtlxbkvaliy.exe
      hhqtlxbkvaliy.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:980
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    e87f58b97a2e54c11a4fcb98fdcb106d

    SHA1

    3f5a13436ea7d7790deb2805cf404a007079c38f

    SHA256

    8cda14a832231631e670991b74bc38ac55b8e3869f887561787cbfb89b662c34

    SHA512

    41a0c8a726f4b6771c8a6d7603cd4f1ffc83e4c8b38ba3c31f4f4b30cc5dae4a98b0d30a339b79e3f09e119903dbb7ceaa2bbd8d2e9434fba39cb05ab021620e

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    63bf1a5bd26f700936aadf01594ab90f

    SHA1

    c13a5a9616e1c42c4522c78e4f510812b971646a

    SHA256

    5b5db2c34ffc189871e8b662ac6d56d19a7815d4cf1f8148c710accc5e7a57c5

    SHA512

    f5389dccec1374bf1d05e3e055d9c209c51bcdd1d67b92b9204b66e50a413f95449de6aa8fc94b1655e84d79a2c1cad9d3328bd459e058888f75964a9d38ae31

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    833c5e402233b698209c16c26855f2f8

    SHA1

    07ff6df973184d31c72f8239b53ac1c91da100db

    SHA256

    b937758717269794ffdb0aa6f0288f336179441ff95c0d418b8ca8bedd193323

    SHA512

    1e280abf4b0e383e1c70f3bd5d2da7eee7b035ae3f431009ebd5eb3fa23a253304d25f806e0b646ea8e2e07456150bb7195fc6edd35cf80d8e4e29a375f9e5ba

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a9ae08fecbf3402ac78c52a17586998f

    SHA1

    4e7d55ca7c22ea9a3f916cb9c3f63ab6af669358

    SHA256

    2ec129d1f616fe239a229f820b1c15f90528f9868b192d1198598f7959146608

    SHA512

    045efbf5221096c0867a72f7ee0314c88e05424a7808c97b66256d6d73e2a90c54371e8bd6bee0eb0e85c9981104d23028fd82aad287bfa4ece904f936ba1b2e

  • C:\Windows\SysWOW64\hhqtlxbkvaliy.exe

    Filesize

    512KB

    MD5

    dba7c45a05b3f6f36948617af4689ae1

    SHA1

    0da286eacdd0307bcd8210892e83dba7ec6aa9db

    SHA256

    cb3f52b8de55f2a4d098d1df216be10b25b8cb2a9950f778e205f72af33284c0

    SHA512

    8e8d333596cee0f16f97671557de16729cb62b6a4e0a41ddc5658d529880168d607485c1dd35f2f940f0bbdafbfb8d13d6213197bab16ee1fe4a17a5867e3431

  • C:\Windows\SysWOW64\lzksoszx.exe

    Filesize

    512KB

    MD5

    d90c448da1df58ed04fb2c201cf5a3c7

    SHA1

    e1912f008d0a7e80bcf3f0f5e073a2901f0c2a8c

    SHA256

    500d47d54be4f978b95b74468ec7d82a3679656220614ba6bf48415e304a2397

    SHA512

    a1e375406b311131da3350895eb2157f3b23c281b3e98b9bda6a0822f6e53a0c373bf7b74281a285ffb7f67c969213ffcf475aba5e4c4ca13125e76ccc20c7e3

  • C:\Windows\SysWOW64\torwgtdmzk.exe

    Filesize

    512KB

    MD5

    a34b29968b32d9e053676346fba3b1a2

    SHA1

    f91764aea23b5a196f289f57f8148bf6b4fe19ee

    SHA256

    719f261baffaf9142e20909fad1578b0196c3f2b22be276bcd183ae5eeea72f9

    SHA512

    cf3fb5dd7ad8fd022b98f41a924b2180fd63cfe08e8eb273660f67eacd85b97d84fe87e89d5f8692ec256a403f4ef1c3b9d8cab16cf5b14d523d684afdf8a650

  • C:\Windows\SysWOW64\wincoqiqdxcvnfz.exe

    Filesize

    512KB

    MD5

    6cbb132accd514d89790b386b28d6288

    SHA1

    6608b20f8ec7bb460bae0be5421f5ff0481528be

    SHA256

    d633bc6dd8521c9e14769a517a0ac30963b048e30bd5092e7257df55c9456cf0

    SHA512

    1eee578078cb2e782d21ab340ac4ee722c6ad6540c0ad0fa84921ba9b3d23e0decaaea0104d7cbacb734419ea3c4e3e767d37bc9851bc74055e93de747ecbf53

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/3152-41-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-67-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-43-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-45-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-44-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-46-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-47-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-48-0x00007FFE0E000000-0x00007FFE0E010000-memory.dmp

    Filesize

    64KB

  • memory/3152-42-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-120-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-61-0x00007FFE0E000000-0x00007FFE0E010000-memory.dmp

    Filesize

    64KB

  • memory/3152-65-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-66-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-39-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-68-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-40-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-38-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-37-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-116-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-117-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-118-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-119-0x00007FFE108D0000-0x00007FFE108E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-121-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-122-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-123-0x00007FFE50850000-0x00007FFE50A45000-memory.dmp

    Filesize

    2.0MB

  • memory/3224-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB