Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 10:36

General

  • Target

    3ca1017ce9db8d1410b6a80d36010a29.exe

  • Size

    512KB

  • MD5

    3ca1017ce9db8d1410b6a80d36010a29

  • SHA1

    e7c33a26079f18203552ad8a46826d68357ca112

  • SHA256

    2a3d618022b62a1229e1ff44a667540070672c2789707b82a2fae3bdde1acfd0

  • SHA512

    4f91de27eacb90480463c56b2763862a72ff8789500d0d64cd7ffeb180813eab877e3fe2c01a715c1d61f55220edc1faa13e28ca474217f716ab3700a076639b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ca1017ce9db8d1410b6a80d36010a29.exe
    "C:\Users\Admin\AppData\Local\Temp\3ca1017ce9db8d1410b6a80d36010a29.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\nicmksdjzh.exe
      nicmksdjzh.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\elubqgyx.exe
        C:\Windows\system32\elubqgyx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2480
    • C:\Windows\SysWOW64\uqjayrpykygbemh.exe
      uqjayrpykygbemh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c iduqfqqutjsnn.exe
        3⤵
          PID:2828
      • C:\Windows\SysWOW64\iduqfqqutjsnn.exe
        iduqfqqutjsnn.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2660
      • C:\Windows\SysWOW64\elubqgyx.exe
        elubqgyx.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:1816
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2996
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      f88e6c1f19140cc0c441e56f33f44f5c

      SHA1

      2a8aaa30dd20ca88d56b0675152768f59c86c83f

      SHA256

      028411adb7452e395bf250ddc921f76de18bc41ff67bfe815430446b83dafc59

      SHA512

      2caac919b972d31d0352f0f9cdef33d66810942909f49abd11874fd8bb4325cea9df02d43e7ca86510d424821ff785c642c0694f99a149b4744fa285bed777eb

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      efd60d3a932d235b23bda7fe16ad53e9

      SHA1

      89435c9f9316a8a8ef1e6d0d0aaed85227b27454

      SHA256

      8b11737b72515e29cb8a8569888be958a8ec6b292b96a674b2a404e5fb4fe1ca

      SHA512

      1041398e7c67efb0db48349283e03af2e42609009d0b1856a1dae5aae20a47f910c23977766a72911d958ac1911338c2667777d8034a772e1403664a5734827d

    • C:\Windows\SysWOW64\elubqgyx.exe

      Filesize

      512KB

      MD5

      c9ac4738a8f42cbd2737ef55ce0136ce

      SHA1

      cbe1ef103aaa1a5f1e44eac0c5c3474370530a9a

      SHA256

      1eb4c1a0fafc4da8d40d39c5d777731cbd559850d58601af46365aaada94415a

      SHA512

      354df3ae3ff6c870dee96b903e1df058fc49e0cabfb85a27a530445b4a5efbc4318cf893746a16295197f1a781a9fe046b56bda8527b9ec8a9292d66e87d4ae4

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\iduqfqqutjsnn.exe

      Filesize

      512KB

      MD5

      2801ee4bb4acd42785fd693340ad4c96

      SHA1

      a6c53ceb7d0a33824c21024bd29ec7751bd1518f

      SHA256

      7f0cd18e0d1507b8181cdbc53b114d3e0184ac368081a8bf5d0684c5c6d7466f

      SHA512

      012c37d8a5a11286e96156ae397d6dd167a6091ad843a31efbe43d54f376fca202bb2123ab967f746ba4fa6031397b3aa04a93452bf3bcd75b15251ba2826ffb

    • \Windows\SysWOW64\nicmksdjzh.exe

      Filesize

      512KB

      MD5

      aa2879a6c2d9b89b36e1da67685f40df

      SHA1

      734cb22a03bb1383644ef8f3572efec3ffc124de

      SHA256

      d9cba0e6d0ce8720b9e69afa1b015820da98224b339db6d633c9e5d46c8c3e8d

      SHA512

      b93a0d8213763df56ab6bcb7e1367cb7d6b0476af1c8320ef942056ad2c0e69800710c71f85ff51a0f987f7204e33b5b93bf43c3ac50c1b382eccd23e333a1c4

    • \Windows\SysWOW64\uqjayrpykygbemh.exe

      Filesize

      512KB

      MD5

      ba246f3e284c2aaf60913b193b0f7f2b

      SHA1

      a1a320a7abfe5916a7ce495ce4850d6e950d6ec9

      SHA256

      57b58d03bc21304324528cdd3000b57f4be2d7fcbdc68a7100dea47d63c3f75b

      SHA512

      cc78e47e1273d6223cb4360a20e2d7d67020a6136697be3c7010d808552e98a47db222271be41dfda95e52ba7ad5a35c6fad3fc5a306fe35cfebecaef8ce4802

    • memory/2292-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2992-65-0x00000000040B0000-0x00000000040B1000-memory.dmp

      Filesize

      4KB

    • memory/2992-79-0x00000000040B0000-0x00000000040B1000-memory.dmp

      Filesize

      4KB

    • memory/2992-85-0x0000000002670000-0x0000000002680000-memory.dmp

      Filesize

      64KB

    • memory/2996-47-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB

    • memory/2996-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2996-45-0x000000002F841000-0x000000002F842000-memory.dmp

      Filesize

      4KB

    • memory/2996-78-0x0000000070EFD000-0x0000000070F08000-memory.dmp

      Filesize

      44KB