Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 19:40

General

  • Target

    ac73d3ab2ca930996226857a8cfdbffa.exe

  • Size

    512KB

  • MD5

    ac73d3ab2ca930996226857a8cfdbffa

  • SHA1

    74b5bc3ac9e2b076f172d7ecc448a145942773dc

  • SHA256

    a597e3296b3e0adbb6a791ba706fe456522452eaea594533de7c8fff3942cdd4

  • SHA512

    ec16405c62f51053d74c1e619015344fb50f36b798c57b52569bd9042da112395ab487f367a05c0ea7597d8903a1ebe421c1894345bebc75f5a1a3a83c247db3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac73d3ab2ca930996226857a8cfdbffa.exe
    "C:\Users\Admin\AppData\Local\Temp\ac73d3ab2ca930996226857a8cfdbffa.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:4908
      • C:\Windows\SysWOW64\xzesgysclmqwa.exe
        xzesgysclmqwa.exe
        2⤵
        • Executes dropped EXE
        PID:4704
      • C:\Windows\SysWOW64\hmiwjvlv.exe
        hmiwjvlv.exe
        2⤵
        • Executes dropped EXE
        PID:4308
      • C:\Windows\SysWOW64\vsdpzwjeiozaguc.exe
        vsdpzwjeiozaguc.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3660
      • C:\Windows\SysWOW64\xynaokiyhy.exe
        xynaokiyhy.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2516
    • C:\Windows\SysWOW64\hmiwjvlv.exe
      C:\Windows\system32\hmiwjvlv.exe
      1⤵
        PID:2824

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        d06ead767e7b127e5ebbebbcd001f237

        SHA1

        64916a365e6d809e36da4fbfa41c00418a3ae2d0

        SHA256

        e7c417188a8f6255875705fe9dc447a6efc0855798f437277d158316ec6c1051

        SHA512

        a8fc47d3abd4370a45fe388da66562f979e0beffe16458030257db77a851ae7400891bb1f60d275ac36e5e8a00bad8a1f60ae8c5b8ca4c3c13f210eca3234190

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        c8b7c837807d0d8ed0a9d5314e313301

        SHA1

        2b56b58722375cf2f3b830f2e83325647df694c3

        SHA256

        b8dd00b90061b7eece81890bab3c94f148f38d1201e10c20eed2e91263a8a799

        SHA512

        81507647c05ea86582e4851f6b7cfbb17413d5e2295bc2198fd06ee655208973cbcabd467f8ec0aea3df2bb48d1cc16b949994951c38f2ba39231621ec7e8a94

      • C:\Windows\SysWOW64\vsdpzwjeiozaguc.exe

        Filesize

        512KB

        MD5

        829db798fa057a51c4c4bcad479c5415

        SHA1

        fc18df39a8d5e5cf4369bd931877a46ee42a10d8

        SHA256

        601ba1c48f53e5500fa9f79ad7f8063f16c1f45921f90c9cf51dc1e2c1e336a5

        SHA512

        579f4a9391cf8801ffeca928593c9536c1f2add962b2a8b0098dc16b686e34ea2b14679413fba7ddb9a85fc0acd759334b080415cc6a49101845d51b12cb13ee

      • C:\Windows\SysWOW64\xynaokiyhy.exe

        Filesize

        512KB

        MD5

        2f8eabbbbe6416d459866ce4a3145d7d

        SHA1

        0b7a88d34a2317de822aa4dd87fe5e5b88c5093d

        SHA256

        7170cc0155e7ae7a94c3c2cc3e092e0da1a15a419b4ba803a49386f66476f426

        SHA512

        c090db12325e839d6c332750af625f4368bc53fbad7fff9a87beef7338d777b1ca097ed3b4ee81efd81014748b168fab5a14c4c3ce64b11d33c3061cb27f6f0f

      • C:\Windows\SysWOW64\xynaokiyhy.exe

        Filesize

        92KB

        MD5

        59ebf1358a9b829f5709baaedeeee6fa

        SHA1

        1409fd65da1b814db0a08feae54366dfca196f1c

        SHA256

        d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

        SHA512

        a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        512KB

        MD5

        4b958b101cc75c5b3d9540aa26c60382

        SHA1

        544d6f01e5fa521c461a562b1a0b56705f73cfcc

        SHA256

        70092e690917209bf607377fbf942285960051bd1568fc843c5fb1c323cb6ee0

        SHA512

        48412b6b1a242821b6001fa6b2be2c21134cae1d6dfbb2ae6acf873426f6d3ea794daa355f228094055ef9e4a05e0c4a2b856de03e1d57d2bca2fdccaef33da0

      • memory/2492-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4908-57-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-36-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-54-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-59-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-58-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-55-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-52-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-51-0x00007FFC8B8B0000-0x00007FFC8B8C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-48-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-47-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-43-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-44-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-42-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-41-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-40-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-39-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-38-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-56-0x00007FFC8B8B0000-0x00007FFC8B8C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-53-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-50-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-49-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-37-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-35-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-125-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-126-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-127-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-155-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-154-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-153-0x00007FFCCE130000-0x00007FFCCE325000-memory.dmp

        Filesize

        2.0MB

      • memory/4908-152-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-151-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-150-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB

      • memory/4908-149-0x00007FFC8E1B0000-0x00007FFC8E1C0000-memory.dmp

        Filesize

        64KB