Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    10s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 15:07

General

  • Target

    9ca4427a910e9f15fc2a87757cd871b6.exe

  • Size

    512KB

  • MD5

    9ca4427a910e9f15fc2a87757cd871b6

  • SHA1

    e32d9df9ccb1ccdb5b8f345b880c46de84160c14

  • SHA256

    8d0ab5f2c2d326b874b9def3652767889e524e5c645c6c73848d4eb736441272

  • SHA512

    4560e5750edf7a883a0985af4a58d05f6e11d635ba5bc79686f98b77cfc52294db10e7b612f080c0183fa03680b74c37b338992496459360041831a3342b6a54

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6G:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5V

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ca4427a910e9f15fc2a87757cd871b6.exe
    "C:\Users\Admin\AppData\Local\Temp\9ca4427a910e9f15fc2a87757cd871b6.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\SysWOW64\alqbmdgpas.exe
      alqbmdgpas.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\SysWOW64\dkdvyjda.exe
        C:\Windows\system32\dkdvyjda.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2408
    • C:\Windows\SysWOW64\dkdvyjda.exe
      dkdvyjda.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1592
    • C:\Windows\SysWOW64\wwzjzvpyeixkt.exe
      wwzjzvpyeixkt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2668
    • C:\Windows\SysWOW64\kxjenevdtsylbtp.exe
      kxjenevdtsylbtp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1188
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    091062a5ebfbbea5fc23f651f926db51

    SHA1

    bc73041a7314b3b92d33bb67f712ff69ff6d4440

    SHA256

    e721b437ff22ff25b57a2235c78086c7b4bf11dded16ba83e8cc844b44e575e0

    SHA512

    339e3fb367b5c8b47548baf9a3433c57d3744ac43e934b4c1274fffb6f12d4fc0db8f93731215d3becec6ffd3160ed4223c3f76dd6cc91b819efab838c08d7e5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    9346be0f415a51d4a2f6e7ae5541c011

    SHA1

    888061c933b92038550297fc75fd5d301a650ef4

    SHA256

    b525f2d7879c76ca1a91241d9c75ac76718e7c094ef87a629d006dd5ae780aab

    SHA512

    4cd250fdc70148b2b907819b34dcb759f1d306ec4b59c259712d6137b6bdf571437b4c5849abb5ecf17ee31e92c69ec1d02e763a78eaa91af80692e573d57fca

  • C:\Users\Admin\Desktop\ConvertFromCompress.doc.exe

    Filesize

    385KB

    MD5

    279a2620e67ba2860803639715d616fb

    SHA1

    2d61471cafcc1c2fb06dd6ac75396f9e7c856f52

    SHA256

    399ca40a278578c7b9ec69d047c914ea58fcd007d6703c4fcd3db2a892a016f1

    SHA512

    bd2c40f12ad56957ec0c184c0f84fcaeed8bf39efd985fe14130e93f0ac568fc578d215defa208a168b171a5947dd0d0de5b5c46f304b5e9c3b6d377e5438a69

  • C:\Windows\SysWOW64\alqbmdgpas.exe

    Filesize

    512KB

    MD5

    de97bc8590a44c98ade0dd18e3643ae5

    SHA1

    fe5fb02b9122477038b9d847b2042ecf4c1f17af

    SHA256

    bec89692dc8ed0dabbd318c3bdf2773056d5160a3740f5edee11ef65cbb426bc

    SHA512

    6652b9914177b170feed54b73ccf40d2e6b1571f80e1576c68cfa0b082c9cd80a973b91cf086d21b13abb1387f59d85584963122357a8af36c310a7b1ef2d8e4

  • C:\Windows\SysWOW64\dkdvyjda.exe

    Filesize

    512KB

    MD5

    504526abc61d50a2f015984435464eb6

    SHA1

    e68f20f758905ee31d7df479f7135d4b7d027cee

    SHA256

    5ea8b868d7f984338b72dd63fcbf827a48ee47587eef6446db24e0e8f4b21236

    SHA512

    c41bb963ed2a77233ecee4e670e15de24807fda0aed1e125c87d56922098857a1313f95844393ac72c4f77b2826dfa48bb4d6cac042af632ddf3d3d121b033fb

  • C:\Windows\SysWOW64\kxjenevdtsylbtp.exe

    Filesize

    512KB

    MD5

    dfdfcc7c470357d4f0d27a27af8bb28f

    SHA1

    5db4db70ca6dc381243c9376c0103b4fb381821e

    SHA256

    f7c0b9198f11db36d04345fb816fe181705dab83e8112e6a29a57170a5b9f537

    SHA512

    0bf2654dc52e607c493368c094658f855579134ea1ec7d95981b1126260f7de130388fc44de28973398afd7f14f84ca38331fab5b45c778d584a7ff4f4b8466f

  • C:\Windows\SysWOW64\wwzjzvpyeixkt.exe

    Filesize

    512KB

    MD5

    cfc59823390b09d0d117fcc15c7e556a

    SHA1

    4307dda93561aee55f2ff54bababd3e4284c5dec

    SHA256

    6aceb413f942574c06480086901917c97942db7df513b1c6847e8575b2fb9090

    SHA512

    1b777cf06d5eeed34d32e7c4416a44109ec178b629932f3e3b8b0921e0e8acfd9a0b0f67272ae68717cb6cb004738b2ca6319a82ac2294d2c6ec8da83fc8b3dc

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    381a4c33cd1c23fa5551ba5317fda3e0

    SHA1

    ec1e5a0d91c8fb206bd4224506a8c6226b2eafbb

    SHA256

    43894cede7446ae740277825d74edd9a11771ff5786b862eafff0b3a970f77a8

    SHA512

    5c0449096fa51f42591d3b7c85c9f397c2b33addaf80d7d8ba975cc52661f561bd194dadf61d77d54f162b3f6b0bcdd055058d2a6c12003203b4d63f1228de9b

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    212e62d36c1442714112545cba5cd367

    SHA1

    202a6722c7184fd0ab107de49e14e04173e3ca8e

    SHA256

    8a60e6f7a8541c4d217ef42966ee52fa354ca73bc8f696971e1d5fe02492722e

    SHA512

    5e269c07c03dfdc820c539285807cab8602d3ab2539c595786a4fc285237fb687b05382d83bc018ffdffdbbc35dd76c5d66d0afe36a2592a30bb40234d82b2e0

  • memory/2196-47-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-50-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-52-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-53-0x00007FF7C5920000-0x00007FF7C5930000-memory.dmp

    Filesize

    64KB

  • memory/2196-49-0x00007FF7C5920000-0x00007FF7C5930000-memory.dmp

    Filesize

    64KB

  • memory/2196-48-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-46-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-41-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-40-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-39-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-38-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-35-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-36-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-51-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-132-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-45-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-43-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-37-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-108-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-109-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-110-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-137-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-138-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-136-0x00007FF807F70000-0x00007FF808165000-memory.dmp

    Filesize

    2.0MB

  • memory/2196-135-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-134-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/2196-133-0x00007FF7C7FF0000-0x00007FF7C8000000-memory.dmp

    Filesize

    64KB

  • memory/5108-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB