Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 16:52

General

  • Target

    6fd1083bf5feeb646bd239a8a746071b.exe

  • Size

    512KB

  • MD5

    6fd1083bf5feeb646bd239a8a746071b

  • SHA1

    b2fa8706e82e41d761acb14bd8cb2f3f5c9297c1

  • SHA256

    a52f6ab0aa9602129134aeddd524fa53ed0b02e7f2f4c6e10358f12384c4cfd2

  • SHA512

    7099119882f3ed29b8e8480e946f2d8cf2ae38ab12aed10f65ae4d1beedeb99b9d1d13666f6f7c3f9f3e9a20322d57c7cd0db647869c4e5cd5103f98e9459c4a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj65:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5S

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fd1083bf5feeb646bd239a8a746071b.exe
    "C:\Users\Admin\AppData\Local\Temp\6fd1083bf5feeb646bd239a8a746071b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\lasuveljzm.exe
      lasuveljzm.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Windows\SysWOW64\ljvywfoc.exe
        C:\Windows\system32\ljvywfoc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4820
    • C:\Windows\SysWOW64\mumglfawbblvthn.exe
      mumglfawbblvthn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1152
    • C:\Windows\SysWOW64\fzavwmnytrgrq.exe
      fzavwmnytrgrq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1852
    • C:\Windows\SysWOW64\ljvywfoc.exe
      ljvywfoc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1176
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    210adc886fea702519614508785fee5a

    SHA1

    922e0ce85629b5ae721e7cc0d4154f95f479f905

    SHA256

    3bf0e380e1abf65be7a2a0c91bb317fe6e8381d77a7630039e22b2d8778a7428

    SHA512

    ac31f2b931540d16a1066e612dbd86af708478c65c380636bcba9338aa7b6a420cbe3429051a2687e931a2f91b2e44eb8873a144d90c13cd1d2df1836b74d340

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    b4dae28eb12e03e4003f3083e8d5724f

    SHA1

    f1d6c21241a8d542590862cc4286db7b327ca2dc

    SHA256

    f4b0006915827ae0219ecc7ed37ae0d906c6889de5ed0d638ccb20e71bb818db

    SHA512

    70725032ae0756b3c387e5c8ced7e507d9b4ac8b1333cd8c9be626dd338c9b67e9a597dc1a0c1a88db306014f01468b6230e37495374a496f881f597533ca18f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    7653177be72e436fb3d6c076619937fd

    SHA1

    450fbffce5fa91627cdea62c4e35d9a4a0df518b

    SHA256

    c88f70e8dd2bbd2aa600d20762abaecbd98dbdeb0896af86357f760d4270716b

    SHA512

    f0ad7bd08549e5d58c8eb556772176fe57e8cccf24e59b627fb340c0c6d3b6d324004d8504850ccef48ac21e641ebef9eb3bc0f440ad910a1a4e4edc7f3a18a1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    6239ff66cd6616977d9ef5976982270f

    SHA1

    e55bf3904acb3400f177011c824e999a0fcf68a1

    SHA256

    311c97bcf97451f82d00d0695be9b8f4cd83e291f2261669829f19760ef23b36

    SHA512

    80df484f62fceb1c5755f146c237ac83330498c22933abe65c811b115f5b72ba11c16ce166d8534b2195a1a940103b534fb95eefc23c2a7c5832590055f34e84

  • C:\Users\Admin\Documents\NewUnpublish.doc.exe

    Filesize

    512KB

    MD5

    0a4d1aa32668b8f8e41c22912fd86102

    SHA1

    543d2cbff1861653b603f91788b1b1954cf9b6e5

    SHA256

    fb183b617360a592aedb3e769102728d7933221e53b3666d60b262b679123065

    SHA512

    99ce257c492024492fdb6b2ce4897d75d8660b4e072f00ebaf21c0d1f2ed0c8db785964dd354cd1a4c60ea386c245091310b2bccc680110850b4e92eb5047384

  • C:\Windows\SysWOW64\fzavwmnytrgrq.exe

    Filesize

    512KB

    MD5

    386ca312b115f373d586b56430508d6f

    SHA1

    9eb08cd7cbab21ac4d1b668057c2bb3be7950491

    SHA256

    42f665c455ed41c7bad29b4f8f557a31cc9347abcd4f4aecae8056cea3d4b727

    SHA512

    0133c6e64c0d764ffc4fa2759b0f3b96b38d18229e0d7a9269a2b545bcf560c3877e082d1ffb863a40e9a0c9e7d6c59ed0d3c8651e9251f564fd665512042045

  • C:\Windows\SysWOW64\lasuveljzm.exe

    Filesize

    512KB

    MD5

    111b01276d8dfe5972f645191ed8a9b3

    SHA1

    3f746e1e2eb7f6cfa06aa8d42beabb3f67a0b8a8

    SHA256

    db866babf1c97b91fd1b60ee0c68b780376feec80581c76f294cfcf0ead48221

    SHA512

    16eada0d35af3f8fd23a0f138f9eab1384922fb6c32c04553e715ba6a8ef2aa7201e0941ddc339c04356b51e8454ff152bed4df82bb161bec1012d6f42d11446

  • C:\Windows\SysWOW64\ljvywfoc.exe

    Filesize

    512KB

    MD5

    cbc95e39fd2986388364d978b11a7345

    SHA1

    a8b7d37f91bc97367f222b660e7fd5d6c6be562b

    SHA256

    7e23c109e94a6e794b0631194e8a76d09755c3e29d135cfffe9a9a5abb63d98f

    SHA512

    419bcb5ce0162e1745965804a97d97b8d4e96047a53d04b7507af92e13bcf20bbce4d8bff86ba52b0b0051068afb005fc3edfe22a8c8b6fb8180176fc1fe9bc6

  • C:\Windows\SysWOW64\mumglfawbblvthn.exe

    Filesize

    512KB

    MD5

    37c810c3b33beacb0b80f8c071ae2549

    SHA1

    c8e04aef3201a7f0c3e733f5a8fa323be4ca6be8

    SHA256

    43d678c0c796969b7c486b140092af46f79548bc2f1abe5449cb27af27b34ee2

    SHA512

    c70adf8595d6f885dc548d8a95c2b7b52cc402b348aa75757fc29078e37296b03f25e11f4c441ea4a537d446312a36cd96a1f6cd850da053410585cf5cc946d5

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    68d30566ba113db13c03e0817a350c32

    SHA1

    e40299d85f1d6459c2b28fcbcecdecd12cec22fd

    SHA256

    e58916e31a7222ca04cc8f65590fd8c60b6b0ad87018e5dd5d6e3480b485996e

    SHA512

    43b16aa8b499554dd3381092652e59769c4561a3b8ebc3d1d35a5f5e4907343fe751d07ec30033abd5b53679d98630eb49b7a2be4344283f9653daea5043c668

  • memory/384-43-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-44-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-46-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-47-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-48-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-49-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-50-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-51-0x00007FFBE5390000-0x00007FFBE53A0000-memory.dmp

    Filesize

    64KB

  • memory/384-52-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-53-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-54-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-55-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-57-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-58-0x00007FFBE5390000-0x00007FFBE53A0000-memory.dmp

    Filesize

    64KB

  • memory/384-56-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-45-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-143-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-42-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-41-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-39-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-40-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-38-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-106-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-107-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-108-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/384-37-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-139-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-140-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-141-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-142-0x00007FFBE7870000-0x00007FFBE7880000-memory.dmp

    Filesize

    64KB

  • memory/384-144-0x00007FFC277F0000-0x00007FFC279E5000-memory.dmp

    Filesize

    2.0MB

  • memory/2240-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB