Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 00:11

General

  • Target

    2130a456b913ec6d1f4f69d53d617d21.exe

  • Size

    512KB

  • MD5

    2130a456b913ec6d1f4f69d53d617d21

  • SHA1

    5311be53a09fdc5164c5d870760536fbc8b7001f

  • SHA256

    6d815b4ec81d4ea54182f6d99861fbd1d94e9b3f0f611beb7593cbbe15d75391

  • SHA512

    36b0025849c499a92fb86c351d49ea3562f7813c07d4f440ff8629752b3c4d352018cfd4802c7b5c9019429187860bb1e3cc2c7acb64f9bec20e99ddd3c94e20

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5P

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2130a456b913ec6d1f4f69d53d617d21.exe
    "C:\Users\Admin\AppData\Local\Temp\2130a456b913ec6d1f4f69d53d617d21.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\SysWOW64\oklgdxmm.exe
      oklgdxmm.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1340
    • C:\Windows\SysWOW64\uygzfhzfyjibx.exe
      uygzfhzfyjibx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4404
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:3468
    • C:\Windows\SysWOW64\cubkavaubfthhcr.exe
      cubkavaubfthhcr.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4956
    • C:\Windows\SysWOW64\lavkxpdqyu.exe
      lavkxpdqyu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3528
  • C:\Windows\SysWOW64\oklgdxmm.exe
    C:\Windows\system32\oklgdxmm.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\cubkavaubfthhcr.exe

    Filesize

    512KB

    MD5

    a62fb582dd6d3ea7f0d89332af8c3bde

    SHA1

    c56607e3e761b69c8199415b217693d12555e8c8

    SHA256

    912f4927abfebd8b4b3ef655858f2295db4b9ef54ff75fdf484c87356af26777

    SHA512

    052b8289d56989aa33423c1df4c5f5e52d1f421ff6bb19f287ce194ce6c5f7b89a96ef91ef9ffe96e4eabffad8fea132cbb737bfa40533ec590cd49236497063

  • C:\Windows\SysWOW64\lavkxpdqyu.exe

    Filesize

    512KB

    MD5

    f3de457750116737bb0e748501e69874

    SHA1

    456b7467d1a5b477729b04543b32f0bcf72ef7a2

    SHA256

    eba21bd8326db14cd6bbc1aa757b91a1cde93390ce6b953523888927b25d8307

    SHA512

    371eb675faeff962fa4420b4ff85a85ae8b36e28156a5ddbf7af1917e87fc065bed2dba78b9ee019915f90a7eaaf5e2252201069191adcfdec62140f99ab6167

  • C:\Windows\SysWOW64\oklgdxmm.exe

    Filesize

    512KB

    MD5

    59ab9b97d8fcf84f1c4a0f3ee28fee22

    SHA1

    e348c1f764d3a8f56bad0e21cd2a747670059b0a

    SHA256

    e1fdcc025a1827ebea7081c8023ba4cf8af9e977f0d7bb7f997e5e44e0c950a0

    SHA512

    b4241e8ecee8793ad26c9e04aa26ce989954d76d07616db0c5c8b7ea64b7fe604862752906240dda65775b91ebad3448445c07866e07434bb0e6242fdfdbfa82

  • C:\Windows\SysWOW64\uygzfhzfyjibx.exe

    Filesize

    512KB

    MD5

    bad6c55bca2c5d9f9f498610fd4682f9

    SHA1

    534c934773920cd45ddfa438d62b03b2f6962b3f

    SHA256

    18dbbe0e3b94cf27245474d234f6f2c1ed81c5078d81172a240e3223ca757e24

    SHA512

    9654f70ece93f1324450a4280ab831eafa175612aacbbfce120b290055fb904db8f07a752ede6027b0571d3aaf559ba23f5b6b3e06fa1cce205779f976d97f0b

  • memory/3468-48-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-38-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-40-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-44-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-49-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-52-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-55-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-57-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-59-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-60-0x00007FFB898B0000-0x00007FFB898C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-58-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-56-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-54-0x00007FFB898B0000-0x00007FFB898C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-53-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-51-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-50-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-47-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-141-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-144-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-45-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-43-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-42-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-41-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-39-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-36-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-119-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-120-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-121-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-46-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-147-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-148-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-146-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

    Filesize

    2.0MB

  • memory/3468-145-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-143-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3468-142-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

    Filesize

    64KB

  • memory/3908-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB