Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 13:03

General

  • Target

    5397924660b1303ae18b98574737138c.exe

  • Size

    512KB

  • MD5

    5397924660b1303ae18b98574737138c

  • SHA1

    2810380a2f4a9740154124b818ce99194104d8d0

  • SHA256

    f1ee0894cbd512511beff6769544b0352496542a2ce369debfbd0ec6eb26c751

  • SHA512

    b8cd82e122c95b6dac9fde33a36941d352ff640d09dd59dee87dee4bdf2c8dbaea1ebfd0cb3bfda5348fcfd46a0b94c0187b1d530c403da03cef1908a675b967

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5397924660b1303ae18b98574737138c.exe
    "C:\Users\Admin\AppData\Local\Temp\5397924660b1303ae18b98574737138c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\mmzokpgvkb.exe
      mmzokpgvkb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\wngylwbg.exe
        C:\Windows\system32\wngylwbg.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2668
    • C:\Windows\SysWOW64\fuvkajgsgludu.exe
      fuvkajgsgludu.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2720
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2760
      • C:\Windows\SysWOW64\wngylwbg.exe
        wngylwbg.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2592
      • C:\Windows\SysWOW64\tbxdtriuvjbevbb.exe
        tbxdtriuvjbevbb.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9557d2715462e606805cbc88875bc5ce

      SHA1

      3ee487d905f2fdfc1d33fe71ef3fcebcffbb8388

      SHA256

      4a1a7c26ad00e6dfe4709f02ff3247994944a8f83f1ddc7f809b9dc6097dc387

      SHA512

      4d1f947f0b3e7d9b2ed9b69f0605ad0772ab4f63402bb39cf78299819aa24471cd7f975b6496de53bbce49cc4decb800da7cd7730d5a9dec0ef32ba89756b1af

    • C:\Windows\SysWOW64\fuvkajgsgludu.exe

      Filesize

      512KB

      MD5

      f1bd18d8b6a7d7cc415e05118b6a56c3

      SHA1

      127bcb21c788f639512ee8dc1423209b27f50bb5

      SHA256

      7dda02a2861aa70409be870ba953c909e44c43ef374ef55fffe3239cb988bb9c

      SHA512

      43e97ac1df749a331fe5c3dc47bfe1dfb139fec68d4798545b8cd588d9a5f4264156b47b328441ae140056bf33944b178c97dde4224833a9c39897617faf1e28

    • C:\Windows\SysWOW64\tbxdtriuvjbevbb.exe

      Filesize

      512KB

      MD5

      3aa8fbb5051d9d80b9b7b631b2e8d618

      SHA1

      e54f2224174e5e978789977b84d40b5a504946dd

      SHA256

      d165f455973d641442db3663fc743c3c89821adea527f6089bb4fa58067f992d

      SHA512

      314483b2486ff7745031748b63540a61084298cbf549d858ab46f0a7b69c6882c9ada77eb54a370a25efa92525442206dfa05a33373dfc4d7e57d91b633b716f

    • C:\Windows\SysWOW64\wngylwbg.exe

      Filesize

      512KB

      MD5

      c0c69a83e832c67cc3d082995c3d3153

      SHA1

      8e9cd20c8fd7d3afed6395ff3fef7f7122e85c5f

      SHA256

      a030e1e6e561bd9f6e829bbc02836e62e6d893dc89bf0aef318a8b3eacb1ae73

      SHA512

      5115299977af80c42e76964a51d796cb26572d5affc8ca22da3432261dc28c752e25ac0615cfc045ddcff79220bee89b6a9c4627e51d54ab82367860db43f958

    • C:\Windows\SysWOW64\wngylwbg.exe

      Filesize

      381KB

      MD5

      30aec9e0b33fbd99234328357879f812

      SHA1

      3c9d37139d4ccfe2b694afba9633170d0f510a92

      SHA256

      15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

      SHA512

      2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\mmzokpgvkb.exe

      Filesize

      512KB

      MD5

      a2f0ab23cae0ac9910f00247d05e6d6c

      SHA1

      808cf6365645c050ea09f07e86fb06a49f9255ce

      SHA256

      c8db38b74306daec4d88524ea5cfda4e5dddacc593a3068d2c549d41ee32e8e9

      SHA512

      d6756494c018e027f99fbac96a6c094001bf472f106262b034ec1303cdbc39feb015b95fb79b0fb918cec9c6dfead700229b9d771094a18e945c3cb6b757cc6a

    • memory/756-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2476-45-0x000000002FF31000-0x000000002FF32000-memory.dmp

      Filesize

      4KB

    • memory/2476-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2476-47-0x0000000071A4D000-0x0000000071A58000-memory.dmp

      Filesize

      44KB

    • memory/2476-74-0x0000000071A4D000-0x0000000071A58000-memory.dmp

      Filesize

      44KB

    • memory/2476-95-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB