Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 19:06

General

  • Target

    7b08b4850997162cb775641f8e651d38.exe

  • Size

    512KB

  • MD5

    7b08b4850997162cb775641f8e651d38

  • SHA1

    1e6b1cda9e5485d687e0c8cbcee9e860c133ea86

  • SHA256

    567f54e9750445ceee03431cf67310b5b258d25ba9ac4c686989b56b61b1118a

  • SHA512

    5c2959ce5df916279ca4d3b4e35e9e89b65b0928f925c68fb5c1e1fe39a1d0e68bdf49b797e506872a0297991f8285b19ff8a675bd3612d0b4d22a82edbc6cda

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5w

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b08b4850997162cb775641f8e651d38.exe
    "C:\Users\Admin\AppData\Local\Temp\7b08b4850997162cb775641f8e651d38.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\qkhcqhrd.exe
      qkhcqhrd.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3108
    • C:\Windows\SysWOW64\ggjdccdazibes.exe
      ggjdccdazibes.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2720
    • C:\Windows\SysWOW64\wgdjxzcqxyjxpte.exe
      wgdjxzcqxyjxpte.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:512
    • C:\Windows\SysWOW64\rpkxxhxqiw.exe
      rpkxxhxqiw.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\qkhcqhrd.exe
        C:\Windows\system32\qkhcqhrd.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4644
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    241KB

    MD5

    2f1beaa723a50338d3e6e3766fe66da0

    SHA1

    36192b22b85ab03b5b4f696aa0140e6375782d96

    SHA256

    83b1eb960adde2a7e9a5d3de3ce9950f0d64ef7d42241d2854f3526fe08dfe5f

    SHA512

    622c0ef15fdb97794ae53faa78d312bef6ff4fe9741aa8f12fda6fa6ace3a3bc49f08109b4bb027d77b38618c6c0a109037e1ddf72cbda1592eb9923a8c5fadd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8eb15fa77124e5b3a06e949b66c3f47c

    SHA1

    b7870f4c744c3753614eea9a1b12d5f0d144f680

    SHA256

    9fed5ead0040bcd2bdc3b7ff5ed4a1e096bfb545c2ab0953393a31f7fc8bd3d7

    SHA512

    e32445ad95e32e4498e418be0c8f9f9bff163df00e326ac6b86d2c9d4298353b4dcfa03323d815fd7d9ac74727776b7aab6b8744ed73999035d9b2176982efca

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    1c1949bfcb2b73e2ee8f1a8724021771

    SHA1

    472bf121349b58633b73b5d77a570c86a9a4f043

    SHA256

    d3e79e896275d0b3a018121316abbc58b673a5ea4d995bf9e43eb06f37dc0969

    SHA512

    3f20d50335fe367d68ca82851f145939282ba4973c6feceeff382b124b2eed70e263e50378a17ec8fa4099734d0836b170701e03ffeec79efc265ad8d31484b3

  • C:\Windows\SysWOW64\ggjdccdazibes.exe

    Filesize

    322KB

    MD5

    abb2a86945c4e328e20397d795be4234

    SHA1

    e91614f7953e294ceaceeacf43ef6fba4b446f00

    SHA256

    d420524d462492e3b2948f0eb5a20b6b0070f3d8aee38d3f8b92ce69cacdf37c

    SHA512

    4f27da8bc5f8c5721f526f0afd7b672f4451c4f6a334f268293bed80e742a63534ea9ebd0e19aaf8cf2efec393331625d458da7d290e25d18ba0a9827ddc212f

  • C:\Windows\SysWOW64\ggjdccdazibes.exe

    Filesize

    278KB

    MD5

    6c4c3f1eaeaf8afbf0ef92d134cec511

    SHA1

    6062699b9c9d28a3cb484c2ba3b345e189682a5b

    SHA256

    0a0085a8311ab8fa356f7968169957ab77dcde77903b57abe791182f117ce7a8

    SHA512

    4cb1c1957053540a9f35e883df33a13e66744585d82a4c60eb5ffddbf840b0916ebbf3e2db6ced31ed5453e84cfae8104703a9319f31607dab9e780d45c1f5a7

  • C:\Windows\SysWOW64\qkhcqhrd.exe

    Filesize

    200KB

    MD5

    ea7c1c9c0a31dbf813d7c0cb9a7b7810

    SHA1

    f2fdd69417d3fd8229f0fa21adb030b024e19529

    SHA256

    156a7cf9624262c2c7c6d71d33964f7fb8b66ae3bed11d093921827f4e5287c9

    SHA512

    19a080ab415c032a91556f202a16af5d585a90f896ccd2f8daf34aa9fe98c0b492f56bf5c4c69748f3ad8f3f7d0605ce112f1e56e13e5180b5f4cb2bb840bd56

  • C:\Windows\SysWOW64\qkhcqhrd.exe

    Filesize

    368KB

    MD5

    f227be5b27260d6085bf895b370b5614

    SHA1

    2f9206f71bd602d0481e61171ad904a833e75dbd

    SHA256

    653b23fb25464cfa9686321280aa3939435461c88d3b6236419d3e9fb00c1a60

    SHA512

    be3f53b2199d940280f26e32b8aea648c48581dc9eda6092e5fb4f2a1de48edcb87e177307e023e5e3a55c57791335fe2901375ef9c2685d6b1c55f540e53624

  • C:\Windows\SysWOW64\qkhcqhrd.exe

    Filesize

    143KB

    MD5

    06b699aee2ee91242a10e9f3193143ae

    SHA1

    8ad02369beb34c9c7784594dfd569e0378c3237c

    SHA256

    944c134743a9db4f4ff39ede6a80bce4e3cba19c2a10ec065949433d16dfdca8

    SHA512

    f5211ca3d56c80d3a9979f3e5df93088ad7b07ecd758ac162cbecfe3af2edc8b253bfc26f6a12ac70595d2c15a48f362a2521ea7a3b51cf705ac00591862e30a

  • C:\Windows\SysWOW64\rpkxxhxqiw.exe

    Filesize

    356KB

    MD5

    2a8ba7440eecdf09ea2f6d9acf5c0e91

    SHA1

    4074cc55e3da679e04819d0b631c9b518b7f68c6

    SHA256

    3526a4de60eed5680d62ddc690738160a596855fbb5615b64eb367b076523d96

    SHA512

    56f5fd6acb8cb6458f2ccf334f9fee93eb5e04a94945bb07e8ee2d64679e0945541fab2054c7699d6115ab6c4913768bda92fbb1b7495392abe86a701c3febbc

  • C:\Windows\SysWOW64\rpkxxhxqiw.exe

    Filesize

    338KB

    MD5

    2cd38696b8e60f666d63ddd71249f428

    SHA1

    108d3b4f0e5aff73ccb6f49d799da1404bc4d4b1

    SHA256

    1ec2c9614a521404cd65767f0eab79c8d0639b79f57ef171c3afac0e9c22cfed

    SHA512

    fc345d253c2827668becd1ffbd0eade1c977221c1038f24f2f6991b4bb873231d99a6aa28e5e5c3bb9f72468d245f8b51b26bd9b9c9c26abe07716116f1341c5

  • C:\Windows\SysWOW64\wgdjxzcqxyjxpte.exe

    Filesize

    276KB

    MD5

    e6844422b6061da0fa919ce9353f209c

    SHA1

    21b22283ff2636b510b4151a96d75c2f10fd91a6

    SHA256

    daed3082354eb4816ef1c087d6b371e80c78006d25f18312578c29d70163f878

    SHA512

    eb5a57d9ed6fdb3b5a1f13f29bbf76ae720344daf30f2c74f4df5e338145dbe2934e982bc372febd96f232173bad2b2cb9091a8b6af2b958966578e9c32b042a

  • C:\Windows\SysWOW64\wgdjxzcqxyjxpte.exe

    Filesize

    246KB

    MD5

    0da7fdadeb7400bf0c51193959312626

    SHA1

    c25f0044010bf54c67dc63a8ceb7767402d3ff7d

    SHA256

    0409aa648f9ec9b27c589cb5d09d453e077eba8bd4b3c246494d37a4eee6896a

    SHA512

    7bb29ba783e929e6d43cfe88c57b9b276de76ebd9a7ce0c00d5970ef7c720044edd8731809db5263c1a89da7ce1f83546b73308c7c150ddb9f0c46762dba7957

  • C:\Windows\SysWOW64\wgdjxzcqxyjxpte.exe

    Filesize

    431KB

    MD5

    426bf5fb1f9c4d49ec7fcd4a2f0a0593

    SHA1

    572ec933859679ac5031ccb11218756fc05ecb83

    SHA256

    d35d84c5c3a6f7f59d016e3a9e3666835769df62c08625ff75756f0ce6a926ab

    SHA512

    339a7cdb38ae33b2e91c0eafcf33a38b4e24c9ac7b5243e8f768cb6ba8595add056f0cb5e0e19a93a1a4905ab352f28eea8d09e9e3d910f74554ef64b9bede7e

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    70a3978b8722589e124aaa13f4bfd15f

    SHA1

    65206d909b91e418e59bb443b9d3f5574bec39a1

    SHA256

    c231ddab24f2e6a0c74e8c9ae92b7e6d582f7c8f1b4009c20caf4cb65c504c85

    SHA512

    fdeeb1e2c598062666e93f099b2ea8316570a42a6d51f381c04cc1718f8fa864ed79e449a1f49f149911ffffac5b0c58114c951eede7a940609ce5b6538f0039

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    09a22217537e8dc6e5112371dd2e7b3f

    SHA1

    b51be7d82923c3beec820e827cd269e50fec73e8

    SHA256

    58cdfe94f6d3caae147799e6318fdb8160e71b16d2fe58a2719f096ec5ac6999

    SHA512

    770582f21084f3785e4ebf9baf77164acd0fa1ff2db58ab1cd9cda956d69d285643c70849b6fcb5a458fc345e8df1b15fa58cf1cd20ea15f8aa0d6229c8df908

  • memory/1820-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3164-39-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-49-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-55-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-56-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-57-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-54-0x00007FFFAABE0000-0x00007FFFAABF0000-memory.dmp

    Filesize

    64KB

  • memory/3164-58-0x00007FFFAABE0000-0x00007FFFAABF0000-memory.dmp

    Filesize

    64KB

  • memory/3164-52-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-51-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-48-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-47-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-46-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-44-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-42-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-40-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-53-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-38-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-50-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-45-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-43-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-41-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-37-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-106-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-107-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-108-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-130-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-131-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-132-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-134-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-133-0x00007FFFAD190000-0x00007FFFAD1A0000-memory.dmp

    Filesize

    64KB

  • memory/3164-135-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB

  • memory/3164-136-0x00007FFFED110000-0x00007FFFED305000-memory.dmp

    Filesize

    2.0MB