Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
4df7e7e09adce9b3f4b523923d8e21f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4df7e7e09adce9b3f4b523923d8e21f3.exe
Resource
win10v2004-20231222-en
General
-
Target
4df7e7e09adce9b3f4b523923d8e21f3.exe
-
Size
512KB
-
MD5
4df7e7e09adce9b3f4b523923d8e21f3
-
SHA1
1b86839a4bc5b385014967c395df0c306221c91b
-
SHA256
464a5697ee6a51a31ce135f954a7d65105eeeb28a9f5f9f29f3c02a1c7c17623
-
SHA512
25cc24ff3f0ec29f3ecab3e0ac562a363dc43ecb077eea7c59c5276e867881253ba79da36b6f653753ef9b3ed5cd6777c83a1d4ae21b2c1ee1ffedb7a9dd3cae
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5p
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2168 djpumvghrw.exe 4812 gjiuepfukcuojkw.exe 228 fncynogp.exe 4304 oubqbjcmrvnjy.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3204-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\djpumvghrw.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File created C:\Windows\SysWOW64\gjiuepfukcuojkw.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File opened for modification C:\Windows\SysWOW64\gjiuepfukcuojkw.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File created C:\Windows\SysWOW64\fncynogp.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File opened for modification C:\Windows\SysWOW64\fncynogp.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File created C:\Windows\SysWOW64\oubqbjcmrvnjy.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File opened for modification C:\Windows\SysWOW64\oubqbjcmrvnjy.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe File created C:\Windows\SysWOW64\djpumvghrw.exe 4df7e7e09adce9b3f4b523923d8e21f3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 4df7e7e09adce9b3f4b523923d8e21f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33472C0D9D5082236A3177D670212CD67CF565DE" 4df7e7e09adce9b3f4b523923d8e21f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9FABEF964F2E583753A41869D3E94B0FB028C42140349E1C442EB09D4" 4df7e7e09adce9b3f4b523923d8e21f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B15D479438EB53BFBADD3292D4BF" 4df7e7e09adce9b3f4b523923d8e21f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFEFC82485D82699141D72D7D96BDE0E630584167326334D69D" 4df7e7e09adce9b3f4b523923d8e21f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F36BB3FF1F22D0D20ED1D38A0E916B" 4df7e7e09adce9b3f4b523923d8e21f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1845C67E15E5DBC2B9B97CE3ED9337CB" 4df7e7e09adce9b3f4b523923d8e21f3.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 4df7e7e09adce9b3f4b523923d8e21f3.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 2168 djpumvghrw.exe 2168 djpumvghrw.exe 2168 djpumvghrw.exe 4812 gjiuepfukcuojkw.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 2168 djpumvghrw.exe 2168 djpumvghrw.exe 2168 djpumvghrw.exe 4812 gjiuepfukcuojkw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3204 wrote to memory of 2168 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 29 PID 3204 wrote to memory of 2168 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 29 PID 3204 wrote to memory of 2168 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 29 PID 3204 wrote to memory of 4812 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 28 PID 3204 wrote to memory of 4812 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 28 PID 3204 wrote to memory of 4812 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 28 PID 3204 wrote to memory of 228 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 27 PID 3204 wrote to memory of 228 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 27 PID 3204 wrote to memory of 228 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 27 PID 3204 wrote to memory of 4304 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 18 PID 3204 wrote to memory of 4304 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 18 PID 3204 wrote to memory of 4304 3204 4df7e7e09adce9b3f4b523923d8e21f3.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df7e7e09adce9b3f4b523923d8e21f3.exe"C:\Users\Admin\AppData\Local\Temp\4df7e7e09adce9b3f4b523923d8e21f3.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\oubqbjcmrvnjy.exeoubqbjcmrvnjy.exe2⤵
- Executes dropped EXE
PID:4304
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:2568
-
-
C:\Windows\SysWOW64\fncynogp.exefncynogp.exe2⤵
- Executes dropped EXE
PID:228
-
-
C:\Windows\SysWOW64\gjiuepfukcuojkw.exegjiuepfukcuojkw.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4812
-
-
C:\Windows\SysWOW64\djpumvghrw.exedjpumvghrw.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2168
-
-
C:\Windows\SysWOW64\fncynogp.exeC:\Windows\system32\fncynogp.exe1⤵PID:4324