Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    165s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 19:51

General

  • Target

    02e961514afb689fdbe3ed00211a8d47.exe

  • Size

    512KB

  • MD5

    02e961514afb689fdbe3ed00211a8d47

  • SHA1

    31f2d960acd0f5d2390d16baeb3504e4fe866d84

  • SHA256

    6588989ffa67d28b571211f87008a0139937a343fc7802830cd83e95e6bd3f52

  • SHA512

    e77cea2feb48fa560bd8e9391c43d7bacd20b30af7bef5585afddd1860610424e3ce2196d80439d4e94379e5be2f7bf60bc8952a413ff55e252f996cd61d2d21

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6f:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 20 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02e961514afb689fdbe3ed00211a8d47.exe
    "C:\Users\Admin\AppData\Local\Temp\02e961514afb689fdbe3ed00211a8d47.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\tjbuxcehco.exe
      tjbuxcehco.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Windows\SysWOW64\xhenqumz.exe
        C:\Windows\system32\xhenqumz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2432
    • C:\Windows\SysWOW64\ixxklhfdeupuwyx.exe
      ixxklhfdeupuwyx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2888
    • C:\Windows\SysWOW64\xhenqumz.exe
      xhenqumz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1312
    • C:\Windows\SysWOW64\wpryyhksecast.exe
      wpryyhksecast.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1768
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      176KB

      MD5

      0c55a3835c0a7548ae15c1e549916385

      SHA1

      fda77f8e3a22fc35015230bc8eb58c6beca419b3

      SHA256

      2abef4668fd4d3cbbad8a63ca1ecaa9dd46ceb0267bd5d8eacbf8ff7a12314a1

      SHA512

      603722512b8ce0fce01d8eb891ed6e29ac6f21a917846a7e6276cdf090a16ebaecc5608ab07aea2a0c5ef97a509231c0cf95c90efbc38fb89740399d07e84c9e

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      324KB

      MD5

      b2256fbe9824709f0d772be561e29d41

      SHA1

      ef827f0445064d627b0e52e5f1446d9f66f13843

      SHA256

      f6f2410e6519468e68467562f4259ba4dd0bda26259a49619c3901cdb1c99c31

      SHA512

      f3087fa9070f655cf16e8bf9983a2a54634d55c1bf5b2715ecd3324833b700e1b1a2ebc54351d298bb9b0771b46e28fd404905f3076919763248c6245af2162f

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      282KB

      MD5

      69af79402f6b514726e3679e457e2ca6

      SHA1

      27f702cb2a0c1999aefe1d1d0769633917d3a89a

      SHA256

      08ae79900bf120d981b30f31073d5ed2b006509a4d9d154677a7331fda1c63f3

      SHA512

      b49af0295980c38300ea63fdc26ab0f279bbe72f27fa712334c10d3f7c12dc5455729f19dffc2837b8c50db6b2959a1725a57f8ec5c679ea0b72761fbc4db0a8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      bc6c7afa505b3b4eec8da749c248744f

      SHA1

      94ada4674b317dce4e447c410ab8a0c481294f49

      SHA256

      eefe8fceccd3da66412ba9f05a307852211c2c6e73f79ec513e823f030063daa

      SHA512

      fbefdd582d0f693a4c6aee2362c06efa71431c8c21d11348007e52935c9524af1aad2275f9134c077fd9bf13d9196dbdf83f3d2e53150385d18ecc9606c07ab3

    • C:\Windows\SysWOW64\ixxklhfdeupuwyx.exe

      Filesize

      101KB

      MD5

      e67adf7a8d7b660535fc16083270fed4

      SHA1

      f00fa14bf89fd144538f3c233773cc54a89d2137

      SHA256

      8a4d632cc154fdae27f3b38f2f7c24f23c2d65a94dbea4f6287e4a09b48aef23

      SHA512

      08dc56a1d1c7055dfe7a37eb69b9140c86ddacf851bae960684fb2ea2fd368498f9f3f1a13ee58e39fc9a1814bf65c7de9e3f981cb0f56748fca0007eae65b87

    • C:\Windows\SysWOW64\ixxklhfdeupuwyx.exe

      Filesize

      155KB

      MD5

      0e91aaf93cd598edcc63772147b99729

      SHA1

      f2c3dcdf5fd73fe268bae71766b8aa40f33669a8

      SHA256

      912ff5d3a4c93046cc360525bfb9a31a7e3a41ec6163b3cfca6fd3770d1d7bcb

      SHA512

      fc4ecd09d6e21cf22f8c7b7f639907acce095741e42e6de062c875777917bbddd9fe292d63a05011d0cca218d7d39cbd675ed32fbd9df88663e535c37143064f

    • C:\Windows\SysWOW64\ixxklhfdeupuwyx.exe

      Filesize

      512KB

      MD5

      a6abf658bf677470249538e1f3b84f94

      SHA1

      fb0767787afa35bbf9c09451f74891434f30bc01

      SHA256

      a9e6c726d7c449b5b6afb960e7b1155547719430313d68a4225af685c0103116

      SHA512

      a286ff430bb22cd86c0e10f815f06207b05a9d67f49571152c81eaa6e75b3b623c13d9253b965952c07bbee8c5f7c65ffcc6ed5259281c2fe9a78fb03adc415b

    • C:\Windows\SysWOW64\tjbuxcehco.exe

      Filesize

      117KB

      MD5

      0061f8b8769385936dd989bf9ec31245

      SHA1

      25703f5714e02cce435ded0cb61aa23c926f875b

      SHA256

      d9709b7ef36ea0ec00a2a03afd6a3d1ee7184ed50e3a6b9f7bd8afe41fb7208a

      SHA512

      611e382f6e73b776ebd88e4d484b819c57fe784ed751e2e0e75721abf881163db6048f23458fe5b28dd84684305eb98d6c14f9d6adf89a80e3151d2a1b208027

    • C:\Windows\SysWOW64\tjbuxcehco.exe

      Filesize

      121KB

      MD5

      2c37920e3a1ca1a5a25cee35f3d55e90

      SHA1

      2c28aceac75bc91e310d79ab27de4af4ec1f1bb6

      SHA256

      902837b36dce3881a95920b8d4fab5612f0e12510dc525c9a65daa97679b59e6

      SHA512

      07d389718dce93207ce7465e9590536208e5b43ce6053758b60454930dd00e77951a1dfbd5e3cfdba3f6d88cfa25250692b4a70978033544c25bfc3c3062b3fe

    • C:\Windows\SysWOW64\wpryyhksecast.exe

      Filesize

      95KB

      MD5

      e11b0bc6ca1a7f4643d4d3c223391aa5

      SHA1

      18db1aa6c4966c69aa5e7d0391c512538622e930

      SHA256

      1e10d05cd0a82ac8c1e6716c86a84c3870190d1779bf8b35059e674f4559e852

      SHA512

      5b8785e158964da213e798ed97c730ee951b6accc424e290a04cf6ac7e3272787247a6634e59f41b4ef1d79558083fe08e2ecc77cddf81b38280c4f8312c9089

    • C:\Windows\SysWOW64\wpryyhksecast.exe

      Filesize

      76KB

      MD5

      c43077b414f3c19adb376f80a6051e46

      SHA1

      b4a5d952f2dc2710d56f6921e84889c9daa8be4c

      SHA256

      1f458c634d51b58733ec5d2f416e713cbec139893ce8f4de9865eb6bac0792f4

      SHA512

      fb24707be1c3c2e0046aef8a4b8fb30a74206ae542e19e037e9859b1f95458ea3efcb5dcf355780d333c29efd287ca02707532f2938f49ee0caae3e7263aa799

    • C:\Windows\SysWOW64\xhenqumz.exe

      Filesize

      104KB

      MD5

      489a2cfe7e5322ded8186b1c21a4d435

      SHA1

      60a32c9a893506745906da1bdf8b05988ef8a614

      SHA256

      8b66dc9a77722960521a58806e49139df16937538406833f468f66faed94cc2f

      SHA512

      8276550ba4f050ddebccd638b8ad88fffab4a99596b868534eb4d2ebc92d6533ef53f34e39469fc45428fdde31f726ba3a3a8baf5908ac4d645a532e63aad87d

    • C:\Windows\SysWOW64\xhenqumz.exe

      Filesize

      120KB

      MD5

      c6a6929371896d18a038407c968181cd

      SHA1

      f5f2fb80aacf0208e7d87c3ffc3977ce2edefb00

      SHA256

      92fb18eee76a2d15e6b36443ebab9c1130a19171dfaf163e17bbb7d8681b57fe

      SHA512

      b2ef4935bed8a070489fdc8768df4e69deeac46c53cf90ca20d1461f50472f5a92ff4cae3a0e5abac95ffbae407e05e1988ab0a81957a42e99cb0d44b7833b92

    • C:\Windows\SysWOW64\xhenqumz.exe

      Filesize

      107KB

      MD5

      5a039a6a91caef80b312f21ee7114d54

      SHA1

      b3b6ae77f901bce5e1f826b732199b9e86d35e04

      SHA256

      b834c81efdad0a04082d822e501c4d9252e2e30b540f1da31879482f83be9a58

      SHA512

      3b52ec2e264637933142b00106247ead5ac2f01a290f041cb912462f273e9b538b658a76ca778325720e86aba129e9c20ea328d413266e975e21563b84add823

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      297KB

      MD5

      541f01158a5b270981a5429d554827ae

      SHA1

      f9cfbb20f7b7086e2ca0325ccd103be467d60769

      SHA256

      7c55259e1b74d86a204afaf3bd811ffcf2f53e978142fbbaa2220e9baec0d3e2

      SHA512

      24923ca3ff90e1c2d395029bc1f26b7e43364ea3834c1d207f7e5ba5437c88235f741484d8ee57bb6bf65039797f6ad29d54c3cca5fec31c472bbd6ce3f8339d

    • \Windows\SysWOW64\ixxklhfdeupuwyx.exe

      Filesize

      136KB

      MD5

      dcf2c76bfd98d92b96917c6748a8308d

      SHA1

      46cb97ccfea7f1b3633e161d75f35fb65fa23a1f

      SHA256

      e5e9e98e1544d622ccf5cfe05400163bd003d96233c7c2ee4c1615abfdae3b95

      SHA512

      380413448c01bc96741e0dd8c7f088e8229a90d171dba1011d1b58c698e3e3a7e32ce2fb510283f8dfcbbe0f98ef97ea2d46dfa50e5b25374d957195a5bdc931

    • \Windows\SysWOW64\tjbuxcehco.exe

      Filesize

      512KB

      MD5

      1d067b9e70b609b5927bf86e83914c10

      SHA1

      0225cdb556e2ef9b81020d102afd2b3f2a4e4998

      SHA256

      b5651135fd62026455ea8022724ab3f64ffe9b93aeb5334864fda16b58a2e77e

      SHA512

      62c29485d37da38cd1ffb181a4d414a7dbdd193730bb052efc5a02bc5880cc99914a9d45cdd8d298ac0f97b09f3a903fadb7fdb0189f778422ee1268543fd96c

    • \Windows\SysWOW64\wpryyhksecast.exe

      Filesize

      79KB

      MD5

      c18e970fa8497010a262b254a86e003e

      SHA1

      bf31f234d173d2c410af3d1a3cf183967968ca66

      SHA256

      200db8a17e849621c41ff2a7dacc739c7282a98ce7dc12f7b2bd1772a699424c

      SHA512

      f7d138abbdbe4a2f3b79599f75c8754e1f3f882869975a4bf151416119da3d17125444be2acce8b2f9becfd21be8621f90265db2287a520180bdfd936d287d68

    • \Windows\SysWOW64\xhenqumz.exe

      Filesize

      122KB

      MD5

      d5c5f2f1d4eeb0a4eab5204de51136b2

      SHA1

      752b18523a601c573f41bb18ab0da8397d015939

      SHA256

      6718070c02ba380556341136b1b8890044826f16f7c1f8a7021270cba88209b2

      SHA512

      4cf0db7c5e122032786ba49722e4257f70358106e579aa3a0de61dd769317f160bf578a957cbb813108fd578599656828ab377248d6ac162e1d7744d6821124d

    • \Windows\SysWOW64\xhenqumz.exe

      Filesize

      63KB

      MD5

      61e6fa3a2b79b1004a461e6308e10630

      SHA1

      b03beeb34bfef81ae1d7542aef56ebb0aadf4275

      SHA256

      438f75a1180ab3fa2dded01d1eee9bb097ed93164fe0a7f2b94b2620d7b8014c

      SHA512

      701933e3ee5f5a9b53f0bbebc7736ff2e57ea8e8e9d2f67866f4daa723046299634e295c16c895cbd7ce381a0c4858ce84d1d229f753b0fc5dc6c02aa000d8e4

    • memory/2384-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2508-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2508-47-0x00000000717DD000-0x00000000717E8000-memory.dmp

      Filesize

      44KB

    • memory/2508-45-0x000000002FF91000-0x000000002FF92000-memory.dmp

      Filesize

      4KB

    • memory/2508-80-0x00000000717DD000-0x00000000717E8000-memory.dmp

      Filesize

      44KB

    • memory/2508-101-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB