Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 19:09

General

  • Target

    a18506b622dbef775f88d8a8d3446d8b.exe

  • Size

    512KB

  • MD5

    a18506b622dbef775f88d8a8d3446d8b

  • SHA1

    86bd3d2ebfc928f2fb053c3a9e4765176f9b3a8c

  • SHA256

    c1a0690dfbdfa9a48eaa977809e214981c5bcbbf89ba85f2092cecf0e898f78e

  • SHA512

    3e4f2e25c7780052d527fc285b31ce759b04a4f078a7ff4e4f2c2af6d50af05bb1f0d4e48995b15e30656a5a64ecc58bd56bfe31a6cef78ff70e926dd960f835

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm51

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a18506b622dbef775f88d8a8d3446d8b.exe
    "C:\Users\Admin\AppData\Local\Temp\a18506b622dbef775f88d8a8d3446d8b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\iniphgzhasslx.exe
      iniphgzhasslx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4492
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:632
    • C:\Windows\SysWOW64\rrfsvwoq.exe
      rrfsvwoq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3400
    • C:\Windows\SysWOW64\mntktsirairpumx.exe
      mntktsirairpumx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3368
    • C:\Windows\SysWOW64\zuaczvyacr.exe
      zuaczvyacr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4536
  • C:\Windows\SysWOW64\rrfsvwoq.exe
    C:\Windows\system32\rrfsvwoq.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    147KB

    MD5

    dd4d5f1efa20b26b94b03090e12fb571

    SHA1

    ecf6e9e684315e5f3467eaeb37f2ce54b1a5b05c

    SHA256

    0371728f2568e94ca8af40c7b5d36bf02277ea6284e3168fb2699c685def47a6

    SHA512

    4a7f899a81a81ec7126c8367ed5c0bb62079cdabc6f21c6b3424e690bf7bfef6c39b905124240ffdc0e7805d72336f104557fc4f8dd2f8c15ed13f855e4729c2

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    71KB

    MD5

    528725c5f1fdc2a1706529e540c45924

    SHA1

    41e9dd34b1f97e00299612c4de82b6e4c739f7c7

    SHA256

    0a2d17fb3da150a1ae73015c1265dde9db1df44b9233e80cad9f16a7bda91a16

    SHA512

    efe5edb6cec5435aaf8b73386456cfc451a3cd3a0fd6208d0bc8a7c66e5459daa81a4671012488305dc9f4d4334703017b139d2f3aeaf300217bd963dd0c5229

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    9d1490d78fec79e68dec164995d21035

    SHA1

    e3b45d6d7ec7a844673bbc7f80d8ebd0023c7eac

    SHA256

    c633273805e0407089f16bc65a897a987040b9a4802e48762ecfdd6e7cf2bf5f

    SHA512

    da7b0e9be355714fb014a3447d2e363039d335e78f98d697024b5c9277b748fa1e90223e10fcc73ed4e39d1c6b49ba60978ad54366990d1fa904846a9f857703

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    1KB

    MD5

    199c7bac5b9e897c973ea36bf8f150e9

    SHA1

    a563a4202cd844a457ba936dbe39dcad0c4f9405

    SHA256

    71fa6d25123401d9b8c3553706f824908853e3c7d8b1b5680aa09c37a54edc8c

    SHA512

    ec0b9eabc07d1ba8d56c56be5363e67bcfa3084533ffb39224e627580d1eb9627efaf0047ff991bf3ca569002e1290881b035e17df1e6babcd4bd7130d96db4a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    046aeb6dd9d206681f3784437cf92bde

    SHA1

    6d4d7bbd8b030fb59f0317e7ce7f06e5eae2b1c5

    SHA256

    7e765b0070af5e0e01d756586d07b5270d93b8d310b5f47cfa602964d0b6ee68

    SHA512

    add2ed17fa4fb18802acd877516a794a7d788b94416fc92fdd6e239f5546907f4d9d86f1449c538940a5726c2c256f7ac097e47ee7e05fbcd4b601385fa94d98

  • C:\Windows\SysWOW64\iniphgzhasslx.exe

    Filesize

    65KB

    MD5

    6b2d87c29e03c1669c86b13f0e329f27

    SHA1

    fc01a8091ad1488013e09ecabcbb34ebb2729a38

    SHA256

    6cb9102f5b672aa60bab941d44dfac6baa33354a6dbff3a6cf1b7e16f4e1c61c

    SHA512

    62a6d356d9d1393f780e7ebef155962a8261e76e5c6df375d5d35484702607996e9334a0a3788cde9ee44d7d6cbfbd284c2163ff4e9837884a0ae5712b1e0272

  • C:\Windows\SysWOW64\iniphgzhasslx.exe

    Filesize

    34KB

    MD5

    12a7d8da18cfbdc6fef635500ba4494e

    SHA1

    0157a5913ffb95338d4d25a92f640e1bb268182b

    SHA256

    49276e546c130f6597afd681f82371054098b4b0c3d913252a98248b35df1e7c

    SHA512

    4a356261ca4d95438b3ee12f3ffaee8e27c483d40c0155ad994760a737bc1f5465edbc2ea87511b09053ab625a4b2162460a977b8a55b6f3fe9eb69013b37c3b

  • C:\Windows\SysWOW64\mntktsirairpumx.exe

    Filesize

    60KB

    MD5

    d40c047cb94289e74f670657d2f7df68

    SHA1

    b3e1a5c35db03f629ababf189fad4b6440122934

    SHA256

    a989b0ef4d19807887c6a2d846d948ea449aba4f30cc8d915bc1b1f69f540693

    SHA512

    9718552463d43e52f89fd11f3edc3fc2c15eab058d144f2a6c9967627f33e0acfd57efe0b12394815101639daaaea8e449a2ac87ecf5fcc79d10ddeb49a120ba

  • C:\Windows\SysWOW64\mntktsirairpumx.exe

    Filesize

    64KB

    MD5

    d76d22b81130bc9206c7c947d7a9ea5e

    SHA1

    5956e88a6ec7949ce5a350e21703307d855f34b1

    SHA256

    b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

    SHA512

    112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

  • C:\Windows\SysWOW64\mntktsirairpumx.exe

    Filesize

    43KB

    MD5

    5143b43de6e29647a0ca761aa7558986

    SHA1

    e51a776dcbc53c72aca065612385d283512c16f9

    SHA256

    00ce07dd119139cfdc546ffa95c5664e504cf192ea97d45567e5ab1897e56052

    SHA512

    63f7f7810b3a256ec5168f988a31878a0b88976ab1c1a7b0783f2aa5258034f9997704f8b748d7246ab4da7edf7cc18845847424bcffbdbc169d5a1beb75b0f3

  • C:\Windows\SysWOW64\rrfsvwoq.exe

    Filesize

    48KB

    MD5

    529cee90494d45bffafd9415bc04e980

    SHA1

    144320428e40aaa45b7d7e0381591ca572981d64

    SHA256

    7ef356922331a188f4fc070293c700899c9b4b9bed9b6da2c7e8d779b59ecd83

    SHA512

    000d57fd23401ba660b6d0d71cdb81f82c408008c50ef774287c0c6884f623b9ca9b7580fe8fe98d9db3ae3935c0a4ae1bdda7e2b4f925e1e897a56e7f62328c

  • C:\Windows\SysWOW64\rrfsvwoq.exe

    Filesize

    23KB

    MD5

    12c601b5f2e87dba6a20f7b73a0ce260

    SHA1

    d187da79afc9cd5f39b5d700941c9d67e49a7086

    SHA256

    844bdcfa4c70b404bdefdbdba9c5a52c771aa51bcc8ab89eced76144dfde0264

    SHA512

    3556028ad9aeab812b974c9272cb251801227a41e33bc42750966f9f2aefc3248b4d3dc12cc3eef6b543dfbd9dc96d1ab5ffd5e254ef6277c8ddb0b4af868f21

  • C:\Windows\SysWOW64\zuaczvyacr.exe

    Filesize

    183KB

    MD5

    157eca07c5826f74ef4f63dfa6e1d367

    SHA1

    bf47f83de56674963e6b41cd75a7e116847638a9

    SHA256

    b732c90a29e737004fce32e57f832e18c23ea0a95e08befbf56a05b8dd636870

    SHA512

    f5a835d22f435493300145f9834b0798fc641e387b8734c92999dc62e7ab082b1adef7b251017ee3e9761b5dc9f800c3da67b83be90c1239d6f57d84b37ed6d9

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    124KB

    MD5

    de83bfac85a2c62d0cb12eb47652d5dc

    SHA1

    1990b0d527e8ea6e7503d0084dced33b9ffce8a6

    SHA256

    5d14fa9e8658105bdf0715b3de050ea871e8b3aceb585810c35435c966aed51c

    SHA512

    fee49bcb9c25cce746b005724afca9832b0b74b422569a441bb521bec8d31bca3f286c599b8822e7926cae1d0866a27215be6baf8b285356cd1a0bdf4f5da51e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    25KB

    MD5

    0b958ad37a449fd885c61ba4a7de5839

    SHA1

    db6d2ff5391fc3acf98c28fdc96ef80a00263c9d

    SHA256

    af77fed054555424c6d5f72ceb9d740c70c9e47eff3b37536c2a33dc71b6f86a

    SHA512

    11f743aa50d59d7e5030d95a8245698caeeead7b13a29deb9106df130e9dafc0f8b21ed6a9bcdeb8ff2c0693c723451801946124f55059dc4a92160dad48de5f

  • memory/632-51-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-38-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-56-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-53-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-52-0x00007FF839CD0000-0x00007FF839CE0000-memory.dmp

    Filesize

    64KB

  • memory/632-50-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-48-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-57-0x00007FF839CD0000-0x00007FF839CE0000-memory.dmp

    Filesize

    64KB

  • memory/632-47-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-45-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-58-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-44-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-43-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-42-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-40-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-59-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-54-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-55-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-141-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-49-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-46-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-41-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-39-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-37-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-113-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-114-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-115-0x00007FF87BD10000-0x00007FF87BF05000-memory.dmp

    Filesize

    2.0MB

  • memory/632-137-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-140-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-139-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/632-138-0x00007FF83BD90000-0x00007FF83BDA0000-memory.dmp

    Filesize

    64KB

  • memory/2844-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB