Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    173s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 18:32

General

  • Target

    419bacbe17f2854a74f4dc8147e6b25a.exe

  • Size

    512KB

  • MD5

    419bacbe17f2854a74f4dc8147e6b25a

  • SHA1

    5a8c9da397dcbbe098d985da62858a1ab01e014a

  • SHA256

    652f8702be627fc380f162a3d568d2214da9141b2494a47da1b958c9491ab2e8

  • SHA512

    ecfac2a7e03fc0140184f430c5e4241852e09594cec84dc03c76632feab06efc9c39f0aa6292a5029daeae2bac2dfd9a2264cce37a5fdf6e3b755b23b13f1b9e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj67:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5a

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\419bacbe17f2854a74f4dc8147e6b25a.exe
    "C:\Users\Admin\AppData\Local\Temp\419bacbe17f2854a74f4dc8147e6b25a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Windows\SysWOW64\bdijmcctcx.exe
      bdijmcctcx.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3472
      • C:\Windows\SysWOW64\nzzsrrxx.exe
        C:\Windows\system32\nzzsrrxx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4692
    • C:\Windows\SysWOW64\fshuukmigmizkpz.exe
      fshuukmigmizkpz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1504
    • C:\Windows\SysWOW64\nzzsrrxx.exe
      nzzsrrxx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3096
    • C:\Windows\SysWOW64\hydesxhpwmjee.exe
      hydesxhpwmjee.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2868
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:2600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      6162d6424dd3213342ed78ef22189aa1

      SHA1

      8d66ce76bc6ed6fd0581b0939dc82b34a2aceba0

      SHA256

      8d405a384d946cfe76110cee07a4c95a73cc2314e643cd758fff46ef52aed8f1

      SHA512

      53be57555e7f9a00a2f08c38b6a3a5a56df4194759b6656fae3f7aef98fbbcadd2aa2c4ba4171df76f8041547f164930b794be47e42c75275ced725633510e1a

    • C:\Windows\SysWOW64\bdijmcctcx.exe

      Filesize

      512KB

      MD5

      df8a2cb39923f4c67795320bf666a397

      SHA1

      b9600009a738cc7a8eca00a158606e591ae15a57

      SHA256

      5ffce96ece6b3a9d8fe6aa87c8b1ea695518fec496a53b5aa3b7f153214a98e1

      SHA512

      bde4614dc79e12bd2b6258214e1782f1b7bf2d477d9bead66d1c7789655ca42287a7c9ea5e6b2a808a8ad8be2eea97dca7a36f2417d1f84600bd1269f237e5e5

    • C:\Windows\SysWOW64\fshuukmigmizkpz.exe

      Filesize

      384KB

      MD5

      0e151ec3919b72f9a6c7fe60d10f4ea0

      SHA1

      91fb01badc6db9808233ff95abf39c37982a8c85

      SHA256

      f644299fe8f10c5f3e24c1943fc808270b5d4f853e2316abf091c8d18344193c

      SHA512

      41d25f82ce04a14c21d19a9ad2d12663714221b6ecb1c3ee579a4a134949de0bfb3e6212e9acf97d0659d50e7a034dcdc103ecbedd8a71fbfefdc30f5728c12b

    • C:\Windows\SysWOW64\fshuukmigmizkpz.exe

      Filesize

      512KB

      MD5

      3bd7498890e6ad7f1102e1d25bee4cf8

      SHA1

      7481f242dc4c82122f4edcc1549b34d672851bf4

      SHA256

      945c9f422fec2a2d8f6a51c8b7306f6ff8782b5dc119505efeb206fbc15e9a98

      SHA512

      6ddc55cb550dcd1e98d6202e3b4dc3cf078a3d7c9a1088fc2b402c873520d630b4bbd4c0a7b56af3121f4800e5409ece3aa90b9bc84f495504e0ad76a7f60739

    • C:\Windows\SysWOW64\hydesxhpwmjee.exe

      Filesize

      512KB

      MD5

      8c54526225b9934dca8eef1c711ea548

      SHA1

      0cfce5aaf149e08c25ac8493aebf75aee6968f74

      SHA256

      f7f626ed0a4bf2901359ba90abedbebcdf07212df12d4ced55b5d02b8827e7cb

      SHA512

      36264078e184d1edd646522fa1dceac3ba0b62c93da2f514e53ab491a4e630050ff360250fba4083fd7ea0e8d1b6be0c2ef9c4db44597d67898a4eed6a3cb70c

    • C:\Windows\SysWOW64\nzzsrrxx.exe

      Filesize

      512KB

      MD5

      bd9fad36b6e8ddbe45a44d4b9e93d2a7

      SHA1

      3ca9c2771325f4da600847ffd16bc5909f2c35d5

      SHA256

      b413671f06b7a85705177f4bb23a97918b9f708ba679dd3a036842404958f8b9

      SHA512

      a2bfe5aec77666d63219087cd9ae7e186f6a894d53f08b0cbe3d208815aa306c5d6d8f7573d69a2d5cf8248cf8d21ae7653917cd9b731ab1d282489677c238a5

    • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      32066bc73e6b2b07bb1e343161de60e0

      SHA1

      45374556c16ade372f2f568b3b0a417840b24dcd

      SHA256

      6aeb138b59ca9ddfb1590f19e8e2c7523214e1e658edb780dab73521bd14d06e

      SHA512

      3185de8879932accf44c8b122dd4b786910cefcc31653de7535754f4b5f29512096ef039d71d8c74e2c684667709ac7e17c73707304d00acc00ec547c9cc5b23

    • memory/2600-41-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-45-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-39-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-37-0x00007FF9761F0000-0x00007FF976200000-memory.dmp

      Filesize

      64KB

    • memory/2600-43-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-42-0x00007FF9761F0000-0x00007FF976200000-memory.dmp

      Filesize

      64KB

    • memory/2600-44-0x00007FF9761F0000-0x00007FF976200000-memory.dmp

      Filesize

      64KB

    • memory/2600-40-0x00007FF9761F0000-0x00007FF976200000-memory.dmp

      Filesize

      64KB

    • memory/2600-46-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-47-0x00007FF973990000-0x00007FF9739A0000-memory.dmp

      Filesize

      64KB

    • memory/2600-48-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-49-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-50-0x00007FF9B6170000-0x00007FF9B6365000-memory.dmp

      Filesize

      2.0MB

    • memory/2600-38-0x00007FF9761F0000-0x00007FF976200000-memory.dmp

      Filesize

      64KB

    • memory/3356-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB