Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 10:44

General

  • Target

    4e17f324cbc63baed09f88b5246e491b.exe

  • Size

    512KB

  • MD5

    4e17f324cbc63baed09f88b5246e491b

  • SHA1

    8a0369fe4fe47e91aaf4541e250ec2a394efd631

  • SHA256

    56180f391122f907ae12e15c1279a904b9b12f91747c36042b723996f73bbcda

  • SHA512

    7b13985663465d03a83efac144bfec852f4dfe55b6263ff0e49760f09df52c4f853031bf90893b3b74100e86b409be972c1cc6dd21af84c60c2175903107897d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e17f324cbc63baed09f88b5246e491b.exe
    "C:\Users\Admin\AppData\Local\Temp\4e17f324cbc63baed09f88b5246e491b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\SysWOW64\jemcvhaaqg.exe
      jemcvhaaqg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Windows\SysWOW64\dsfugirr.exe
        C:\Windows\system32\dsfugirr.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1276
    • C:\Windows\SysWOW64\mncvmklajiyfxpo.exe
      mncvmklajiyfxpo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3300
    • C:\Windows\SysWOW64\yiflkelrwhizc.exe
      yiflkelrwhizc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3868
    • C:\Windows\SysWOW64\dsfugirr.exe
      dsfugirr.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1740
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    dea7e0c754cda92011fcbc1bc7dc1270

    SHA1

    7d540cb3eeb727bb3c4bd292ccac6d71af0e0f4d

    SHA256

    da92c3c82df4d25d98300e471314358e363e469f8fad915f93e18d926973a480

    SHA512

    102c058b1f2819b5880ae0a49ee0c5ba62898635cf79d1ca6862fcf11d8a4852f0debbfbdc62d936c6c871af57b69033f46e7ecb33cc9b092da8aeb6867bcb08

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    0e2c2fde4aa47d89948c457c551e187a

    SHA1

    9fe9e2dd609365f58b42ffd8208c0df88df1165c

    SHA256

    0478590466d23d1a0cb3108f62635e6642f08474bf1ae9c12edfcf59e32ef5db

    SHA512

    d55c2cd806a21c8da6fe9e1893e2c89bbfa592392d8e2a9ce60883237a0c14a761ea640478e96172919be9cd32297bc935076fa7d403cab8127689399ac28824

  • C:\Windows\SysWOW64\dsfugirr.exe

    Filesize

    512KB

    MD5

    092b63899b690c3cf57965741301ba5f

    SHA1

    5e29b82bf653d0080afecc6de733f2de6fcd499e

    SHA256

    060d00713bf60751731071d88e4fb3484f469ee3fe6098ed78888c77ba74a874

    SHA512

    0d658c60b2fa70e717e58306660c95f2fe9bf3e9a7236308c05ad2ecb1673b5d19d8827bfc37da1adc96cc184060cf119b40154fde5c00521089375cab6de41a

  • C:\Windows\SysWOW64\jemcvhaaqg.exe

    Filesize

    512KB

    MD5

    1183804d541df31fe5bc5cca8dab9e78

    SHA1

    1e966562c1e1eaf844083dd7508cfa929636fd1a

    SHA256

    ac38564cadb7eb293f70d2d51d4dddeef9e3ef43ba4271b42ff3e57c97ba7455

    SHA512

    478c6ef32101b1e6964e269cee5764717638f0607ce4e6c14d420aa747a4df83ce14543f76258b81f80aee7b6d448d8c71420f3db2910da544d4ba77b1b7cb5a

  • C:\Windows\SysWOW64\mncvmklajiyfxpo.exe

    Filesize

    512KB

    MD5

    6ac64e33362b4adc24dc27d6c69e5bde

    SHA1

    84a9aaa87da2e3ff87847dd92c5340d51d39a461

    SHA256

    89f4d5efe4807bb1eba2584b7e2756a20be52cb4daf1be9dda49ac9ebe470fe8

    SHA512

    519ba09e8700e453637004c124dd86b39f524b80d6dbb63457cfed5d71ec5a9ed5202975a9842e20461815e12413ba0f28a0d76a3a497f2b12266a5d92ed42c4

  • C:\Windows\SysWOW64\yiflkelrwhizc.exe

    Filesize

    512KB

    MD5

    c267ce17dae0386f0a89c973bffdca10

    SHA1

    09d573ce423437f556b3828ccb252e080d2775f5

    SHA256

    342d8bf88db70d4d6e3358169585c92e959b55c187d8f9d614af7c2b4d689996

    SHA512

    e205e3c8af85961e30968d8d2e98440dd3f2ad6db8ada41c02f75af3a1f03f9e3d80d5f061e80981974a59574ec08d742a97a4b920aef96b69a4dc7171fc2dbb

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    86c7bc6c2fa3f1d57ac3ebcd551cfe4b

    SHA1

    b02cb2fbdfb11112a68516502b6e0c8551a3fedd

    SHA256

    985a3e9c7d9445e603c8bdeca6874e44faac28503882f720bf8de68db143f36b

    SHA512

    a36b8630d5031e47671dd10c2d1929f5fe35b28a7ad947190d2595554308bb1431e057deaa16bcc4710d7d8b38a8a598bbcf1695e0275e94141b7c3b052e453f

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    4d82b0c6dc713be8190c2aa9a3b2a9e4

    SHA1

    0a6b84b2b44158c088595cc5f96605729385883a

    SHA256

    4de4abdaf3bbcd899202db8a184794fa239fe51b382ddf149b35b993e9374f27

    SHA512

    1c84a7e2bed4c76b135dc973ee2c1ed577fc399dc67aeea75d9b9973ce32ab664f41cc2cedeac23306263767a2bc55cf8a91ff4b431ec263bc4a0dc0d80c3bb7

  • memory/2680-52-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-41-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-44-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-43-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-45-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-46-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-47-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-48-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-49-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-50-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-51-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-140-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-53-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-54-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-55-0x00007FF931C40000-0x00007FF931C50000-memory.dmp

    Filesize

    64KB

  • memory/2680-56-0x00007FF931C40000-0x00007FF931C50000-memory.dmp

    Filesize

    64KB

  • memory/2680-42-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-40-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-39-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-98-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-99-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-100-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-38-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-37-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-132-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-133-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-134-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-137-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-136-0x00007FF934490000-0x00007FF9344A0000-memory.dmp

    Filesize

    64KB

  • memory/2680-138-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-135-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/2680-139-0x00007FF974410000-0x00007FF974605000-memory.dmp

    Filesize

    2.0MB

  • memory/4068-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB