Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:01

General

  • Target

    17ddb4edf577c9143cab458936f7fa04.exe

  • Size

    512KB

  • MD5

    17ddb4edf577c9143cab458936f7fa04

  • SHA1

    3fcb06b9c98fe4d8aa4778c33a76353bcbf2af15

  • SHA256

    0f65f212348cc045f8cdd39ac4a2a63f626841eb02e7c50bd73b62567befcc3d

  • SHA512

    bfa99ecad681a5360ec3f2083b9640329a7d7f849173fa4d6c12f2526f9da29dc1dd9ce672f8e3c3cdd4b096559c9eb5f17187a9a2e8ed587c313437ce063a34

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm59

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17ddb4edf577c9143cab458936f7fa04.exe
    "C:\Users\Admin\AppData\Local\Temp\17ddb4edf577c9143cab458936f7fa04.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\kcsjscwoer.exe
      kcsjscwoer.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Windows\SysWOW64\xksqrkeg.exe
        C:\Windows\system32\xksqrkeg.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:824
    • C:\Windows\SysWOW64\xksqrkeg.exe
      xksqrkeg.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2408
    • C:\Windows\SysWOW64\qqcabbbsaiehv.exe
      qqcabbbsaiehv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2316
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4468
    • C:\Windows\SysWOW64\nrukxlcjxzqgagx.exe
      nrukxlcjxzqgagx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4517a475f6bcd0159d12f2ae37e0a095

    SHA1

    11ab63569afe4fe9a113cd6c2f9cc8363aec118b

    SHA256

    6e8eddb42c66dea60d54bee0b8917b895ed289d03edb21559b471d5f4b4789e6

    SHA512

    42170c7a4379d38c093d67b423ab37f1ad727b3105a40d4859261feae9743b6cbbf36961b08e74fe6afcf4eeff443b148b491307c2aca2eb1824babdd7751645

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    3733cbbe2aaee4d9ec8f20a61bf929b8

    SHA1

    d9fd2cc1f03e93c5911c203a783e7ee3a64f777d

    SHA256

    d991ae34dfd98fe90c1dcddd25f13b38b63207891ab3c82b09cc4c481cf94eaf

    SHA512

    f6fa8e6c7accaab570737efdfc873e1b56a34fb7130eeea16461ea91fcf7fd9dc79a27c50c7d18d695d82c94e924a9e7d761d07767df37efab792af2f7918881

  • C:\Users\Admin\Downloads\StopCompress.doc.exe

    Filesize

    16KB

    MD5

    53e4ab73f7f23d07266b20bea5611268

    SHA1

    5ef61e6bcdd506b441f4c88cb0b32a5331d3deea

    SHA256

    63ac4cb63d0b0fcf18af61f7bfc41948bc86cb0b8162b5d024a2a2e2f9a0b043

    SHA512

    0d013481966eb856c7c38de5789bb3878e0bd4ba60c5fd3cd576a9194a64415867a54a7bb8726298b843decaf86214a544281ad7aaefed64bc0f8bd8e89eca46

  • C:\Windows\SysWOW64\kcsjscwoer.exe

    Filesize

    512KB

    MD5

    086958a9c8a3941a71ca41042e7c137d

    SHA1

    5ab0a7709eeff3b3bbe0b48c8e3bfc6a074ea66d

    SHA256

    740c2106ba315dc7629214efde87eabe8476ca212ad4c144ed6998ab38306260

    SHA512

    9f33bd96485d5855cea885d4657c3d568b2814d3f6f54cf637f162a7ad01067a084a681124d01cc8d0628088c1a0de9cfaa26a6422b6e2a37899beb971147cda

  • C:\Windows\SysWOW64\nrukxlcjxzqgagx.exe

    Filesize

    512KB

    MD5

    da732ef59aeedfb1127962aa3d5380fb

    SHA1

    d017ef1a3aef76d20e0f55d6ee3c801aebde9b83

    SHA256

    07cbb5fff623feb4fc0426563b072f7d9c2576edaa5359c85b7665cc2c0fd6ae

    SHA512

    c57d8f22cb6e49174e90083a3ac58cf9605ea40b60908c6d732a704f8afb8b3b430a9bc954ccdb01d2611db4ee2943e6b5b9e3b30d92dfcf733efd5700252596

  • C:\Windows\SysWOW64\qqcabbbsaiehv.exe

    Filesize

    512KB

    MD5

    6263d0282823b427054be7954696192d

    SHA1

    b7f9ced05758e195a3b324a2ec1c44319993ea39

    SHA256

    7909cbc5bdc723e90ce81ae83f7e45f96f0e5a7f2c8eb8f32652c37f6563f568

    SHA512

    23ede786d9c7a4816520a1384643d437092d7240341d675f401d8140e1ea7e5e2398a01cedb827f9ed8b37c69ba6ecf1b479d6ef3965af832a73b6a243d93c0f

  • C:\Windows\SysWOW64\qqcabbbsaiehv.exe

    Filesize

    365KB

    MD5

    abc1bc9d6f80300c404beca6b7fda5fd

    SHA1

    41db2a5271d885eff861b03fd64094c1bb6d349d

    SHA256

    57e1af3152f4863a5930d905c1ecdb47de5bd6e2aa98284bf23a6f99cbdd0dc6

    SHA512

    30b547d67bf03e8338c9d76996fd9a25db48d3c292e742ed2b3864461bd20bb76bb167830f0649e5b61068f0e4994623096e917e270dd596e414619937706c31

  • C:\Windows\SysWOW64\xksqrkeg.exe

    Filesize

    512KB

    MD5

    0b8455927e57369f859bcbbea515542d

    SHA1

    5f5214fbc38330edc8907f4e8ff62da64f0dc38c

    SHA256

    15ef645776a4df8d5565e01d99c92e81af4cc137d8cdebe05f5267b669ea7397

    SHA512

    37a3ba10aa691ddfd6e8ce517b9b18b393d04218ae48d7ae64d2845191ac9f3261c1ab6c855087728e4ec8423969d5dd1bc8b1f2db4587450911692477639f0e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    152KB

    MD5

    bac1439a35feb1f91e2e74c05c4150db

    SHA1

    e105c50524f5acb1457c4b67a8348897f18ffcc5

    SHA256

    028c2509d2743e26bc414331a2e6b1aed3d5f51f94a690a211d03bd563636749

    SHA512

    e660baf725c99f4a69ea7847d6be8af0556ef054e58eed5eae984a47cdb6df299b7e2bea9c2e946fd277e0b7fdfee23d4b75eddb8ecbfc09862c8356e680f7ab

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    155KB

    MD5

    b12d175e24740380b995435146402786

    SHA1

    b59db0debfcd65ad1f47affbc9f225fa6ccdba3d

    SHA256

    ac6b8680ad3d764c93be19760314d01a3f9f47c9d6e0b4ea345eeeb483e96694

    SHA512

    273579ad2d233e9dfd71240af486510013fae9601a0197d41c880ad1fe8b5a8661fca3770f45ecaffbf1fc16b565cd89cf39969fed9589e7f5341fab2a61e77c

  • memory/1708-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4468-47-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-40-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-49-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-52-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-54-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-56-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-57-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-55-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-58-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-59-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-60-0x00007FF7D4CD0000-0x00007FF7D4CE0000-memory.dmp

    Filesize

    64KB

  • memory/4468-53-0x00007FF7D4CD0000-0x00007FF7D4CE0000-memory.dmp

    Filesize

    64KB

  • memory/4468-51-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-50-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-46-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-43-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-41-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-48-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-35-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-44-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-45-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-42-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-39-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-116-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-117-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-118-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-119-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-37-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB

  • memory/4468-146-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-147-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-148-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-149-0x00007FF7D6E30000-0x00007FF7D6E40000-memory.dmp

    Filesize

    64KB

  • memory/4468-150-0x00007FF816DB0000-0x00007FF816FA5000-memory.dmp

    Filesize

    2.0MB