Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 21:00

General

  • Target

    03e0a521ccb092a61fb3723b38a58b16.exe

  • Size

    512KB

  • MD5

    03e0a521ccb092a61fb3723b38a58b16

  • SHA1

    3997fa18edffd374885168409d98aecb23b77315

  • SHA256

    3003a35975df39e6fbf9ee24aa6af6565989f80532ec61ab200b51343b409dfd

  • SHA512

    c4ec42774a330a077248166ec564832474fcf68c5489bf6ce46f3892081740c85506ccbff834ac2bac6674b87c9156a7a4c11ab59c7382982f3e0277806a02dd

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6j:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5C

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03e0a521ccb092a61fb3723b38a58b16.exe
    "C:\Users\Admin\AppData\Local\Temp\03e0a521ccb092a61fb3723b38a58b16.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\SysWOW64\pnprkklfhx.exe
      pnprkklfhx.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\qttlprdk.exe
        C:\Windows\system32\qttlprdk.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3044
    • C:\Windows\SysWOW64\qttlprdk.exe
      qttlprdk.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2740
    • C:\Windows\SysWOW64\rbyfrkhptxlal.exe
      rbyfrkhptxlal.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3696
    • C:\Windows\SysWOW64\hquikthyhfmgque.exe
      hquikthyhfmgque.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1620
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    43KB

    MD5

    c40f93a2c9e198d1e932b767ca3d4ec0

    SHA1

    28f30461678e5162893689d0960855f93a115f98

    SHA256

    8fd8caa15e7f7c1e5d0538e37bf9eb68fc818254b56924cb47b355988f5f24bb

    SHA512

    1d990d4e93d2e11de25e8ab4b6c3da304c11a0f9f0c54c4b0665fed88a4c9f4615a038df0d494ba08754cd9b9ee2472089da04a65af41254114d71cdd2f4ccc8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    2b7e6fa953176855a7e949cf870091d5

    SHA1

    aff3cd2d3557d91c9ecee0b4be00f1654a31ec14

    SHA256

    7598f9640acaf43dc5c0cd6f82ec6e2c31d708b7255352b9c5c35b275905d771

    SHA512

    16d330aa4fe617975364a8cd2587425e3b3663bca85e3501857b4a2c114d1e89662fcdc8478412914362f59b797d3c1d29db2f3721930603705f75489467f0ee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    b8fcf4d66adda866da475ef786b24bc6

    SHA1

    3c59217a1cf92f43ff01537e41b6db53ca8ef155

    SHA256

    0d913ce15253af1204e1567ba7fbbc0ff4fd7918ccb9838a34d3b26e4727a1df

    SHA512

    257c433d6ea0db9bf79a2d0e3997fa0ea3dc8cdb70662c3343032ffa9e58855c4e4b8b11c760f2f85ca0c34926fd0f248354f4afcd3f53d160ae2c97af178411

  • C:\Windows\SysWOW64\hquikthyhfmgque.exe

    Filesize

    53KB

    MD5

    eab1c164ac2fb516403c1fba0eb6c588

    SHA1

    3c63eccee7b790f023ae23f0eb91436d7eb59b87

    SHA256

    80e5c3d5bd76070e3b9a6a499ac34c10134852c373b7a91cc132419389b0230d

    SHA512

    38ad21e2f97f3c6bf87f5d40d8d330981696711e76dd15845f01ad22e6435a06ad4dbb3f1a4d9625597185c0c461f4a2d60af943b6bea6e844e165f65afb1218

  • C:\Windows\SysWOW64\hquikthyhfmgque.exe

    Filesize

    136KB

    MD5

    ad1a5b5dceff307d8c25dd5a77de78c9

    SHA1

    66d468ec46c35f52d9543c4616f5293413396823

    SHA256

    2026faa351abc7662dc37822636638866c8a0c753fe71dfaa88a2ece00edf47f

    SHA512

    7f7956399db2cf1ede45ab4f73808f6332d4dbdef67d5190b9305bcda1947a8334f0b1f0fec492dbe138e8d2a77d74db5aa4c83aa0453201b26ef45520d27e7f

  • C:\Windows\SysWOW64\hquikthyhfmgque.exe

    Filesize

    257KB

    MD5

    3b1bc8f1832f2958a1caaaacbbd972d2

    SHA1

    3b78c7a3bd108d39ef1c54f479cc1d2d22041cab

    SHA256

    c14ca5ef7ccb257ff9a14b3bba762a48bfbdcf6f417375722aec8e68219d943f

    SHA512

    2c562becc1dc91de9d9eb4938f103a6d56400d6c143c68c04c72f3816b9c19328eb28a7ebcdb961e4ee30d8231cf5cd2cf1e9cf16617d0200d0df8a997a33695

  • C:\Windows\SysWOW64\pnprkklfhx.exe

    Filesize

    168KB

    MD5

    8f4adb925e87a18e28174b3d44e5b1a2

    SHA1

    cd2b6c58ce1768cfc1e20f4bebbf2196a7b7d592

    SHA256

    210be1bb185c015384f8f6e4efe9811ff41158d52d627f8461cf99e97d486d64

    SHA512

    85d0253bef191a73f200a642412305d804a71cdecf3ac51599f84c29422dbe50fbafce0a76ad1517088a621f7a49ea2ead6eb3b4de81290327ee24b97cfc71b0

  • C:\Windows\SysWOW64\pnprkklfhx.exe

    Filesize

    191KB

    MD5

    b23502816e00697e43ce964e624e3404

    SHA1

    5009ca50913f9b26c3d62f2f58b5ba99e2888266

    SHA256

    2b0702cc0c81b776aea478a53f459532e124115a2bf10071da22fc914865eb2d

    SHA512

    269f60e81a8ef93b9719e1a684bd87bf388250524413ce703fa26cf0a74cc0656381dd7f0f96e62c05eb444f704b0115e16d2b67a1b7ba5957a647b56ac170ae

  • C:\Windows\SysWOW64\qttlprdk.exe

    Filesize

    75KB

    MD5

    7664c775c10c1e2fc06e752d2c27af98

    SHA1

    82690f2ba370714350a70d8fc11e926373d69177

    SHA256

    8c6b18c17441ba9487950b74a07ff8d3d991faa577222a0454bd649676d2dae8

    SHA512

    eae834c12e473cfeeb76f44cb45c5b02be83ae3627df74800b95820531853301af1f234ca9017919a2c29b6fe1b1bede8267c3e44f5bb720b9b50d5b5ec3329f

  • C:\Windows\SysWOW64\qttlprdk.exe

    Filesize

    64KB

    MD5

    d76d22b81130bc9206c7c947d7a9ea5e

    SHA1

    5956e88a6ec7949ce5a350e21703307d855f34b1

    SHA256

    b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

    SHA512

    112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

  • C:\Windows\SysWOW64\qttlprdk.exe

    Filesize

    145KB

    MD5

    a924f9346edc835c21558f214dd01a83

    SHA1

    3de842b21e8bcccd3c56bfe80f4e06920f4e1c80

    SHA256

    24ab93f3004624e51db55884d61dd3b2bf4cb25c10626806ef5a94cf046a358d

    SHA512

    1a4f5fa23cf84e281b228216d2b23b226c64c901e33776c08d97eb933096c70e22796d0edd9ae9c14c017ee98171626b49ccea60d6c8627ba9437e01becb15dd

  • C:\Windows\SysWOW64\rbyfrkhptxlal.exe

    Filesize

    91KB

    MD5

    02c2760690eb9527ef9d51fce4497454

    SHA1

    6844a45c2e454d9c530662543d28c89c061cd0f4

    SHA256

    9c4925bb3cc34af7b31c02440b64db14583ebbd4bf9081114916889786fdd8ec

    SHA512

    b7de0542cb7abd6377b567791b6abd51789ce484abd94effe43ee280cfae58180967c34edc1cbb21bae0fe5695424a39137da652e43951b7aef35196fdfc2f94

  • C:\Windows\SysWOW64\rbyfrkhptxlal.exe

    Filesize

    65KB

    MD5

    649bb0518ee5a42d6cf63649e76f7c3a

    SHA1

    3ba501630833359b7a6ba348f949fe12c5e24cb1

    SHA256

    c30b09d3c90042f1b44ef14cf0617e1fea54f3459883de5e5498788bda0ab597

    SHA512

    f0245419a0c4f7e04f67338d10f186f9f03ce7d6c3c71b2cfbf80abe59064ceed0c6578010c6a37c9a6b370f8a6affd91d9a73515f27fd0dbd071856fc8580d7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    86KB

    MD5

    1cdd37e6af4a9db8f90458476517be6e

    SHA1

    d57eae0b377fd04f634abe26d5a29af2283a590f

    SHA256

    0b0a026feb55a911ebefd249fd4854c3e8e9a487e5443daf2aa57815db83a203

    SHA512

    1b28d57d9e5598d1f8d14ff380f44d6421b5c5ae9eefe83bf2c781e0c0c8de35fc1506bb1878983d8113af78d85a889383ffa3c1d49416af0a5dbfacbf7ddcb3

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    22KB

    MD5

    5271eaa1885e3bf0fd315f80e656230b

    SHA1

    30885afbd5ae380a5aaccd70c75eac1a2a06e9c2

    SHA256

    8ca2b727695115beb2c90f1f1e372542df50120bfd20c04c51337be001997000

    SHA512

    0683c63649ea9f337104ce1883ce8beff595c792b78c7c20285ed492ab1a105428fb49caf77fe099d2c5f1db87c50168b1729d58cf70bcedcb9ce193d6d3d824

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    25KB

    MD5

    9a38033eeebb4c86d432df6a26a3ef2c

    SHA1

    9c0c27f4cd6b38315a42539006028a80fceed58d

    SHA256

    a10e7f2915dc4970955b904f9ca08f0a5ee3a833d0e0fd72c6e53523262f36c7

    SHA512

    177c1f354685a77864a57f39b6e623257730e47471e07f3d91a6d449ceadb4098be7fe74799082a42ac1445d1523371ecc6c1830367f5db824c7158b9982dfe5

  • memory/1152-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2080-51-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-56-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-54-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-59-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-52-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-60-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-48-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-47-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-45-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-42-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-41-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-58-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-39-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-38-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-37-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-57-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-36-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-35-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-55-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-53-0x00007FFE74E10000-0x00007FFE74E20000-memory.dmp

    Filesize

    64KB

  • memory/2080-50-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-49-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-46-0x00007FFE74E10000-0x00007FFE74E20000-memory.dmp

    Filesize

    64KB

  • memory/2080-44-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-111-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2080-133-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-134-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-135-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-136-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2080-137-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB