Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 05:20

General

  • Target

    29c550be18671e1c38bf1726ec71da44.exe

  • Size

    512KB

  • MD5

    29c550be18671e1c38bf1726ec71da44

  • SHA1

    7cf7e29d1e77b71eb45bf68c5254d8b14a228d64

  • SHA256

    74cb279926b4e3b7d64b6bbcf88b7303650cdb4e84020f1275c9adfba67dcd48

  • SHA512

    338a1dd60ca37722560d58f9e603a98a5b0ec8950ade3959e57c95d492b830fdda659ca1f1f9fe1f2504b0b9dbecfa3c47208dae82e6b5757119ac0b394007dd

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5V

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29c550be18671e1c38bf1726ec71da44.exe
    "C:\Users\Admin\AppData\Local\Temp\29c550be18671e1c38bf1726ec71da44.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\SysWOW64\omtjxuzvuxrrtpy.exe
      omtjxuzvuxrrtpy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:828
    • C:\Windows\SysWOW64\qiutkdzigg.exe
      qiutkdzigg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Windows\SysWOW64\mbjzqtmp.exe
        C:\Windows\system32\mbjzqtmp.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:540
    • C:\Windows\SysWOW64\mbjzqtmp.exe
      mbjzqtmp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4624
    • C:\Windows\SysWOW64\wldcwsevxefia.exe
      wldcwsevxefia.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2704
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    237KB

    MD5

    b7cc0b0edeb8504ac89443798bac49c6

    SHA1

    7e4d8c87bbac6882b88db59407ac9854d5964441

    SHA256

    404a592be4405e2cb352eea8a6ad9697c868f0e6a7705cda89531a00f64ebd73

    SHA512

    59141335a25a116c9327202439ba3c3f3147b76211479fd639458d2274a74c04f3b67652c7567a67676627c7f8c59bc34fe74f20866e59762cb631fdf108eee5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8434ec21cfcc5a6f5ca4a8f0a8ffc3f7

    SHA1

    1819ce7fe083d550d0081c07672d4eedf2ff4501

    SHA256

    5d12241d8e769cf1158006554a4d63c8a3a8a2f5db0d5483b578818818e21e5d

    SHA512

    16b86f852ebcec42073094c6d6464f7c3104f34926798d0010db155ece84b9cefeb6225754fc6571b9cd0efbdce9b94f1a42d9d7b0fa3c49b7c69fd7dbfe2aa5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    48c2ab5c98d7288e7d7153e7ea54c084

    SHA1

    cf79e2438a2ef39bdc3ca888691dbb79f120a2bb

    SHA256

    6772d1a863476c65e17dc07e256ea09ffe9faaf955f559be246078551a361049

    SHA512

    bbbb7d002f5867c4fddb65584a97c7a95d1e3278657486842aaa23d69dc4f389db14768777e09d726b5a3728186ae9bf2706b309da3ff497182d2149723d76ae

  • C:\Windows\SysWOW64\mbjzqtmp.exe

    Filesize

    512KB

    MD5

    412236709460e757f2fe5554e4fc5632

    SHA1

    993cc58b206b63e5f9089b67a35e95c3d8c4952e

    SHA256

    74805578157a12962749b143012dc0ce1467025aca52196431cda2bb724b962f

    SHA512

    4b5ca6b47651b5db40fb386bc8eb551d3684c8df8d7c4c3a20b4d31464b50880aec43a5b49edca7c7c86b74cd3ae2a4770168e09bae37d124c9ed5157b321086

  • C:\Windows\SysWOW64\mbjzqtmp.exe

    Filesize

    169KB

    MD5

    4f13248e69e15ed7aa820cc85e1f416e

    SHA1

    2388496e18b902e7320f32c76256b636a40ba5d2

    SHA256

    fedb7eabbae227298346a5915ea4bcb47c7a94e1097a16e5dc4c2a9acc77bd61

    SHA512

    b4c7f4291c45a4a76604f24da1d4a109e0dc93d0c9f28ca05de8ca9adb46bfb24391d95265b1b42673cdeec15b3bcb835077025a3c0bada47606c1c47ffd2c49

  • C:\Windows\SysWOW64\omtjxuzvuxrrtpy.exe

    Filesize

    512KB

    MD5

    64b4c53b03618f40ead1e53c9d1f62f3

    SHA1

    037c3271840c4acd9d56134b8ba3d11d26a3515a

    SHA256

    cb59a47ebf20126a9806d62412999af37f2e121b3c0fb0d3e8cdaa29236ca194

    SHA512

    13c464e3054e2191a2c7d57887970122f4b20333313b0021717f475b41f2e63782dd7b8621bbc4eae2ba0f3e5e77312cbad0319fcf0e4c7242b903c5cb6ee717

  • C:\Windows\SysWOW64\qiutkdzigg.exe

    Filesize

    512KB

    MD5

    697ac2e6d87f489b2cba41da98d4688a

    SHA1

    1ad0ba09293f2a5c418955588d5ed58e53d76ef4

    SHA256

    b2f283a89e41d0396b87ff5b6a50dd5c247dd1cefbae7002880decd34c175d6f

    SHA512

    4ac94bf5863edbd3b40a4ed3fd877c0003966af961bdc7debd96b0852d25d6655bcd4bc64a48d7e7cdc2972f5ba5278632e90fdb111fe0c96909c03dacffedb2

  • C:\Windows\SysWOW64\wldcwsevxefia.exe

    Filesize

    512KB

    MD5

    c1a829af5ab49d14b969ac791094a2f0

    SHA1

    dced2a18cd40bc3b45cec3e2f229451994476757

    SHA256

    30448959adbd575df3f1955001b73a65c7c591c5709c71a2ea825007449e975a

    SHA512

    29e1b85babc5b068311e9c6bd3e8e62f04aac229c43ca34b1fb86b80f948d04adc4a94e052649bac92917f388babce1462e1001e896675f29f30343ff78ac6c1

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    fc1baaab159fa4ed4f81371599fee787

    SHA1

    74ff60cbee122989b271bd6ea6f6ff282be9365f

    SHA256

    c1fc279280384c5c139ce6c1c34b95bfcb3db98690e3b390a2e31334f9a81320

    SHA512

    471b02b613006baa8fdd189962de34404102cf1c1b694bebf3f455e8679ff5f0473b9ed113056686a46c77a18b46d2ac58253194c1446eb8bdbad18c7a694119

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    500f58d28187cb83b26e49a8893a4160

    SHA1

    7b23627bb8b8fcfe8c35be93beccaab83f84ca4d

    SHA256

    011688bdd4b733d4e950d74c60afc5d77d0ec46eb6e3886aa3c812f1112a570c

    SHA512

    0c90f10d8add2f8d87308851c6ce134a441b369886a1c70259df9004eb717760e6f18fefc9f705d347699769d73a3c9aee58e922e9d87b2d9f260ed5d7b46219

  • memory/768-49-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-39-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-52-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-54-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-53-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-55-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-56-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-57-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-51-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-135-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-58-0x00007FFCD24E0000-0x00007FFCD24F0000-memory.dmp

    Filesize

    64KB

  • memory/768-48-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-47-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-45-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-40-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-50-0x00007FFCD24E0000-0x00007FFCD24F0000-memory.dmp

    Filesize

    64KB

  • memory/768-38-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-46-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-41-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-93-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-44-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-43-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-42-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-37-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-132-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-133-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-134-0x00007FFCD45F0000-0x00007FFCD4600000-memory.dmp

    Filesize

    64KB

  • memory/768-138-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-137-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/768-136-0x00007FFD14570000-0x00007FFD14765000-memory.dmp

    Filesize

    2.0MB

  • memory/4716-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB