Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 02:51

General

  • Target

    0c327b45e2e2619cc1116c01db9fecd4.exe

  • Size

    512KB

  • MD5

    0c327b45e2e2619cc1116c01db9fecd4

  • SHA1

    1897e432062b78a0e44d387042f7feb7e8a50bba

  • SHA256

    559797107580982cad1ab552b0d3b930315fd0caa04e143c13de2f4cd7d00774

  • SHA512

    66b2b676e0208da13751c726c33b6a5a0c99f7a809262b90a499b3bbc6acea7876949553f63801ae1de1405ed8af4ababb44feda8953419161c5c21229d7986c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5P

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c327b45e2e2619cc1116c01db9fecd4.exe
    "C:\Users\Admin\AppData\Local\Temp\0c327b45e2e2619cc1116c01db9fecd4.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\emuuzqzvee.exe
      emuuzqzvee.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Windows\SysWOW64\pqgwjnpo.exe
        C:\Windows\system32\pqgwjnpo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3188
    • C:\Windows\SysWOW64\pqgwjnpo.exe
      pqgwjnpo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1428
    • C:\Windows\SysWOW64\oknrxedzyevak.exe
      oknrxedzyevak.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3680
    • C:\Windows\SysWOW64\aiipkkhuhfaidht.exe
      aiipkkhuhfaidht.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3796
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e895c6633f55141064947973ea4afeaf

    SHA1

    9c1354bcf73cc912d742b54a47f0732a95d4d232

    SHA256

    2b12b3229fe497302c9bd25a20dd6b4fbc4a51109242014cab777dc8cd0b8d16

    SHA512

    e37752b4f3503772e6a1694f5c5a2d3e9a129c391da89359e5f3064bd0fc82d3c32ad8e1810a240971a8733adbe0f6163df8b4bfdc76168bcd8730cb662dbe9e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    446b95045d5784e3e1c19583ec71e771

    SHA1

    07a8d83d9fa2d56277ab171c9754289db091ddc6

    SHA256

    4f1f4c9bb438389ed4cb5758be0a2c85326986e2993f452e95f495289a907271

    SHA512

    e65e2c8fcfbf3d48416e7d5cea5166e9871bdd5d80273c725cee88b330659aefaa49f719a9d7ea16a964127d2c7dfaab811adab284f0523d45a8f0a2e341ddaa

  • C:\Windows\SysWOW64\aiipkkhuhfaidht.exe

    Filesize

    512KB

    MD5

    88d813845610f2754840f24ee37c186d

    SHA1

    58b9952ae3b28f0137612a57e2b1a3e290696154

    SHA256

    0f1c6dbb848e600f50a5d891f5a15bedd78f64c1fa6234a65dcd58b77bcbeeeb

    SHA512

    54a9f45607211821c9048453eedadbf710139485cc3eec671078342f6029c9f316d361dfce4e7b22dec0122aa7383c42981c399e927517bc8dbcc6912d83257e

  • C:\Windows\SysWOW64\emuuzqzvee.exe

    Filesize

    512KB

    MD5

    4f25284118768208fe119bbbfc14fa14

    SHA1

    b45b7de632b1e8f5c635bc8d6da47fa041c96a0e

    SHA256

    379ff25fa6b18e8ec9a1c7d959fd86ff49606e7b434339b1237fae823b16089c

    SHA512

    d11ab2507db2fc8da4956f68fe0afe9d1f6b9dc3868240fd2c715e71384fd935fa14c80954fec7da5b75a75630db0ea687ad590c9110111f7dfb6ff0a89dca12

  • C:\Windows\SysWOW64\emuuzqzvee.exe

    Filesize

    384KB

    MD5

    0e151ec3919b72f9a6c7fe60d10f4ea0

    SHA1

    91fb01badc6db9808233ff95abf39c37982a8c85

    SHA256

    f644299fe8f10c5f3e24c1943fc808270b5d4f853e2316abf091c8d18344193c

    SHA512

    41d25f82ce04a14c21d19a9ad2d12663714221b6ecb1c3ee579a4a134949de0bfb3e6212e9acf97d0659d50e7a034dcdc103ecbedd8a71fbfefdc30f5728c12b

  • C:\Windows\SysWOW64\oknrxedzyevak.exe

    Filesize

    512KB

    MD5

    55fc848c32ed2a78b3eb51e0bdfcecf9

    SHA1

    f4fd5afaf6a377f5920350ff2cc8b6309a12081a

    SHA256

    54b6c90187d6dcf3e365bf41a6d7e8706f7219983edfac72e19eb5532f868c33

    SHA512

    ffbb47c133f7fab69ce3a4513f2090bacd2753eb7f44a5f1a1ac2bda0e3a98bd6ee3b64e51c466eefe40f016f884eb4bcae61e0e6fb70188040f4fbce11aa51a

  • C:\Windows\SysWOW64\pqgwjnpo.exe

    Filesize

    512KB

    MD5

    5421cb1cbba708b4ea0c07a64e19ffed

    SHA1

    9667419b526c83905b2456a5cc3b17cb320ba48c

    SHA256

    d3ff18b4c4808393aaed293e30733cb03eab694e34439d82e77b5cc9e9c16cad

    SHA512

    f89a18405de14bb7d0da267798935e952f29d6161e007c7f298976e9099ab72217eeca283032818d8cf764efe4bc1c9e86c722b1c192e5050fff5e1f8e1d075d

  • C:\Windows\SysWOW64\pqgwjnpo.exe

    Filesize

    64KB

    MD5

    d76d22b81130bc9206c7c947d7a9ea5e

    SHA1

    5956e88a6ec7949ce5a350e21703307d855f34b1

    SHA256

    b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

    SHA512

    112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

  • C:\Windows\SysWOW64\pqgwjnpo.exe

    Filesize

    512KB

    MD5

    7ad701e399caec6bc4a08f41ce53da26

    SHA1

    b67b1dba13284ba16e5188eb48db89db30bb8e82

    SHA256

    adecea8d582a4940479b99cf422cea88cdfcded0155b3cc9630d1f3afdaa018c

    SHA512

    0315df02bcf9b9393dce5fd6bd8e89584c1f13b04fc6c82d3030953292beabb13ef061420b2e5249db048b410e86f3378efaeb53cdb3b270d8dd4518ffd8d4f7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    c7ffefa000347a03bc8667117b25dcb9

    SHA1

    4950d745f2f1b71404151ed6331148a40854c8d4

    SHA256

    37eaf63dbd5b4effdeb8d1ebbe47e7f74f929975f74f1f2dcace1eca6fdd7ca3

    SHA512

    f21595eeb4588f5c2686fbc7ed3abb74d5a16f96ce207e6b548af912e10afd39a182d039edd62b16e4fde4512624e831fccb8e429c11d1761fed5a62bb7a8cf1

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    3ac0457604ccb3df2d181ade9322e64f

    SHA1

    3da1df05e5bd7ea97b946d4da1bf59c3277142eb

    SHA256

    aeca0b9d89d833f62262b089a65a05400400241756c88cc8618aca286e970ecd

    SHA512

    b393de750729afa55b3707cd33866c20139867d00db6a60201fc7c5a9fe8b87cf0f2d7cef3ef0ccc6202c5d87173211a168cc47902f75f14aa75376c9e0a26b8

  • memory/2228-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3940-56-0x00007FFA2F1C0000-0x00007FFA2F1D0000-memory.dmp

    Filesize

    64KB

  • memory/3940-42-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-53-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-54-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-55-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-57-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-58-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-59-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-45-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-52-0x00007FFA2F1C0000-0x00007FFA2F1D0000-memory.dmp

    Filesize

    64KB

  • memory/3940-51-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-50-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-48-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-44-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-43-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-49-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-41-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-39-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-38-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-47-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-46-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-40-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-37-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-111-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-133-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-134-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-135-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-136-0x00007FFA31490000-0x00007FFA314A0000-memory.dmp

    Filesize

    64KB

  • memory/3940-138-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB

  • memory/3940-137-0x00007FFA71410000-0x00007FFA71605000-memory.dmp

    Filesize

    2.0MB