Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
ac73d3ab2ca930996226857a8cfdbffa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ac73d3ab2ca930996226857a8cfdbffa.exe
Resource
win10v2004-20231215-en
General
-
Target
ac73d3ab2ca930996226857a8cfdbffa.exe
-
Size
512KB
-
MD5
ac73d3ab2ca930996226857a8cfdbffa
-
SHA1
74b5bc3ac9e2b076f172d7ecc448a145942773dc
-
SHA256
a597e3296b3e0adbb6a791ba706fe456522452eaea594533de7c8fff3942cdd4
-
SHA512
ec16405c62f51053d74c1e619015344fb50f36b798c57b52569bd9042da112395ab487f367a05c0ea7597d8903a1ebe421c1894345bebc75f5a1a3a83c247db3
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2516 xynaokiyhy.exe 3660 vsdpzwjeiozaguc.exe 4308 hmiwjvlv.exe 4704 xzesgysclmqwa.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2492-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00090000000231fb-19.dat autoit_exe behavioral2/files/0x0006000000023214-29.dat autoit_exe behavioral2/files/0x00090000000231fb-18.dat autoit_exe behavioral2/files/0x0008000000023208-5.dat autoit_exe behavioral2/files/0x0006000000023224-123.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\xzesgysclmqwa.exe ac73d3ab2ca930996226857a8cfdbffa.exe File opened for modification C:\Windows\SysWOW64\xzesgysclmqwa.exe ac73d3ab2ca930996226857a8cfdbffa.exe File created C:\Windows\SysWOW64\xynaokiyhy.exe ac73d3ab2ca930996226857a8cfdbffa.exe File opened for modification C:\Windows\SysWOW64\xynaokiyhy.exe ac73d3ab2ca930996226857a8cfdbffa.exe File created C:\Windows\SysWOW64\vsdpzwjeiozaguc.exe ac73d3ab2ca930996226857a8cfdbffa.exe File opened for modification C:\Windows\SysWOW64\vsdpzwjeiozaguc.exe ac73d3ab2ca930996226857a8cfdbffa.exe File created C:\Windows\SysWOW64\hmiwjvlv.exe ac73d3ab2ca930996226857a8cfdbffa.exe File opened for modification C:\Windows\SysWOW64\hmiwjvlv.exe ac73d3ab2ca930996226857a8cfdbffa.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf ac73d3ab2ca930996226857a8cfdbffa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes ac73d3ab2ca930996226857a8cfdbffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32322D089C2783276A3376A2702F2DD77D8665AB" ac73d3ab2ca930996226857a8cfdbffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCAF9CEF910F299847A3A4686EA3994B0FD02FB42620338E1C9459E08A9" ac73d3ab2ca930996226857a8cfdbffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC3B15C47E7389E53C4B9D43299D4B9" ac73d3ab2ca930996226857a8cfdbffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FC8D485C82129146D62E7E96BDEEE147594A66466242D7EC" ac73d3ab2ca930996226857a8cfdbffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F568B2FE1B21ABD178D0A58B0E9062" ac73d3ab2ca930996226857a8cfdbffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1844C60F1493DAB6B9BB7FE0ED9034CD" ac73d3ab2ca930996226857a8cfdbffa.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2516 xynaokiyhy.exe 3660 vsdpzwjeiozaguc.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 2516 xynaokiyhy.exe 3660 vsdpzwjeiozaguc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2516 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 27 PID 2492 wrote to memory of 2516 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 27 PID 2492 wrote to memory of 2516 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 27 PID 2492 wrote to memory of 3660 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 26 PID 2492 wrote to memory of 3660 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 26 PID 2492 wrote to memory of 3660 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 26 PID 2492 wrote to memory of 4308 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 25 PID 2492 wrote to memory of 4308 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 25 PID 2492 wrote to memory of 4308 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 25 PID 2492 wrote to memory of 4704 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 24 PID 2492 wrote to memory of 4704 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 24 PID 2492 wrote to memory of 4704 2492 ac73d3ab2ca930996226857a8cfdbffa.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac73d3ab2ca930996226857a8cfdbffa.exe"C:\Users\Admin\AppData\Local\Temp\ac73d3ab2ca930996226857a8cfdbffa.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4908
-
-
C:\Windows\SysWOW64\xzesgysclmqwa.exexzesgysclmqwa.exe2⤵
- Executes dropped EXE
PID:4704
-
-
C:\Windows\SysWOW64\hmiwjvlv.exehmiwjvlv.exe2⤵
- Executes dropped EXE
PID:4308
-
-
C:\Windows\SysWOW64\vsdpzwjeiozaguc.exevsdpzwjeiozaguc.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3660
-
-
C:\Windows\SysWOW64\xynaokiyhy.exexynaokiyhy.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2516
-
-
C:\Windows\SysWOW64\hmiwjvlv.exeC:\Windows\system32\hmiwjvlv.exe1⤵PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5d06ead767e7b127e5ebbebbcd001f237
SHA164916a365e6d809e36da4fbfa41c00418a3ae2d0
SHA256e7c417188a8f6255875705fe9dc447a6efc0855798f437277d158316ec6c1051
SHA512a8fc47d3abd4370a45fe388da66562f979e0beffe16458030257db77a851ae7400891bb1f60d275ac36e5e8a00bad8a1f60ae8c5b8ca4c3c13f210eca3234190
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5c8b7c837807d0d8ed0a9d5314e313301
SHA12b56b58722375cf2f3b830f2e83325647df694c3
SHA256b8dd00b90061b7eece81890bab3c94f148f38d1201e10c20eed2e91263a8a799
SHA51281507647c05ea86582e4851f6b7cfbb17413d5e2295bc2198fd06ee655208973cbcabd467f8ec0aea3df2bb48d1cc16b949994951c38f2ba39231621ec7e8a94
-
Filesize
512KB
MD5829db798fa057a51c4c4bcad479c5415
SHA1fc18df39a8d5e5cf4369bd931877a46ee42a10d8
SHA256601ba1c48f53e5500fa9f79ad7f8063f16c1f45921f90c9cf51dc1e2c1e336a5
SHA512579f4a9391cf8801ffeca928593c9536c1f2add962b2a8b0098dc16b686e34ea2b14679413fba7ddb9a85fc0acd759334b080415cc6a49101845d51b12cb13ee
-
Filesize
512KB
MD52f8eabbbbe6416d459866ce4a3145d7d
SHA10b7a88d34a2317de822aa4dd87fe5e5b88c5093d
SHA2567170cc0155e7ae7a94c3c2cc3e092e0da1a15a419b4ba803a49386f66476f426
SHA512c090db12325e839d6c332750af625f4368bc53fbad7fff9a87beef7338d777b1ca097ed3b4ee81efd81014748b168fab5a14c4c3ce64b11d33c3061cb27f6f0f
-
Filesize
92KB
MD559ebf1358a9b829f5709baaedeeee6fa
SHA11409fd65da1b814db0a08feae54366dfca196f1c
SHA256d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06
SHA512a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417
-
Filesize
512KB
MD54b958b101cc75c5b3d9540aa26c60382
SHA1544d6f01e5fa521c461a562b1a0b56705f73cfcc
SHA25670092e690917209bf607377fbf942285960051bd1568fc843c5fb1c323cb6ee0
SHA51248412b6b1a242821b6001fa6b2be2c21134cae1d6dfbb2ae6acf873426f6d3ea794daa355f228094055ef9e4a05e0c4a2b856de03e1d57d2bca2fdccaef33da0