Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 17:05

General

  • Target

    a453346112f8761afe8a9154335e17e3.exe

  • Size

    512KB

  • MD5

    a453346112f8761afe8a9154335e17e3

  • SHA1

    a480fd0777e4ac8bb991cb32d1c53ffb682eb25e

  • SHA256

    60b95a28ffe5cafe8531fdc9bda5a47dc1cc6aeeede3aa96f492896e1d61eb6b

  • SHA512

    394dd6281bf4f9d2fcddc0211cb1c56420a329cf1512c92467d0036c338ad3b50b5945089043d29c1c8e674222c855b549843c0008ca9f6ca918236bab2d1169

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj62:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a453346112f8761afe8a9154335e17e3.exe
    "C:\Users\Admin\AppData\Local\Temp\a453346112f8761afe8a9154335e17e3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\voanqsupwx.exe
      voanqsupwx.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\izyhqwac.exe
        C:\Windows\system32\izyhqwac.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:832
    • C:\Windows\SysWOW64\rfzntzbhtzihu.exe
      rfzntzbhtzihu.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1868
    • C:\Windows\SysWOW64\izyhqwac.exe
      izyhqwac.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3944
    • C:\Windows\SysWOW64\suromtvhldzsooo.exe
      suromtvhldzsooo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3112
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    96ce11139edd1e8c0694333da7cec04b

    SHA1

    100abe6f4d68614fd73b21a1ce06feb4b59521d7

    SHA256

    752c54417b74eba23acef9952e9c08c36939449b05d6812a2bca24de099fec64

    SHA512

    9c2812c5f5ffe9b72781d3c6bccd224d3afa6a5a2462da7cd8a66e44fc87487be1b98a3fa485ccdfc00eaa0767413c18b8aefc8918dc14b0c30e07689c81250c

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    f70aa649586529c178cf93aa9b857d62

    SHA1

    cfde48c6070fc4ac4f86022ff9c4a5cf98a02dd8

    SHA256

    72961097f0003d9f540c4fd9f64bac50ee9f177cdf9fe5066894a96c70010d2f

    SHA512

    aff9ef77f192ef2ee24a4362c8188bd8af89756d74572a6d09a22a46a4776a7281ddcfffdc8b76876680d72ec67b133f6ac2f15d0bece7337c5a8bcc85c99b23

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a0fdfab67f240aa416061d2e57476cdf

    SHA1

    02ec8f686f62decb4757e44a9cb11229862faf6c

    SHA256

    59dd19d3b6df9bf9c6cd15de9eb52ca4726567764ffad8af62a83be2c7e582b4

    SHA512

    0bf665a5388cf7ecbc84fc1a3a227cdc0f882083baa495b499790081fce6c4bfe76ba9e8ab1a0be681402f23c64c3f419ef0c4962ec61a53685245a4e241cdcd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    6f7b4c69962b32440ba291c29fadcdf8

    SHA1

    59136ca20a55a00af6c896cb3cd95a1f1968d4be

    SHA256

    0fdab1033c57ab53a38fd279ad18009d98a0514d4e3b0cbac714b437ebae8cd4

    SHA512

    b4a43e9589646d921829c2898a12b6b88ec357d18fccf9c34cd172d7b7643068e484db2c18525934d5f23a4fb3510e301b34843086c4a8867676193f2b96e319

  • C:\Windows\SysWOW64\izyhqwac.exe

    Filesize

    512KB

    MD5

    75446507987487896f18ab623510ab7f

    SHA1

    c1df89fa9ecdf499bb8edcd2e0c298a2e09dd4ee

    SHA256

    d7b87f1da6da84f5b1ebca42c0fc659f78fd69fa4dcf72c899e4d72666bd2f5f

    SHA512

    fc8a054c03697606ac25dc2c56961e00c5c4a88c24466cc7d897752306a672852001dc7413c8a2cd7c22078dd9d49a336051e37b5a9364fb9c86b286c8c3c1c7

  • C:\Windows\SysWOW64\rfzntzbhtzihu.exe

    Filesize

    512KB

    MD5

    1dc6cf1038706ca1e2941c4399045b1a

    SHA1

    77b88a9decaca47430ad4d6c1ac695c6cf84b441

    SHA256

    a671df8d3dca18cc9c4a08ae2fcd7fa0ff5c4fb46eb4e2d8b28408cc21b63ade

    SHA512

    4e9caeaee3de5ec45ed3bae9d994760653a2728ac84b8adb6d3b07aed881c8df92382efb953f536a2d66d9223008323d6c7bf29c30f9ced2f5bb1873a9ead283

  • C:\Windows\SysWOW64\suromtvhldzsooo.exe

    Filesize

    512KB

    MD5

    2a2b5b707f6e14253a979a72211aee05

    SHA1

    9a9c68316a1d1dc554133d6c0a7c605a254b4a5e

    SHA256

    08db04cc297fde89b836541a8691689a3ca9ed452af45a132c5cc627addcc510

    SHA512

    c18148324cc3180813574e9c7e2989ce884f918bff759fc3bfd21cb57a0a742b82130373993c63c2944b230da35028e9d6ec8d86c3a48cfccc9ec2f042a82027

  • C:\Windows\SysWOW64\voanqsupwx.exe

    Filesize

    512KB

    MD5

    91a9dc144ffaba3876e1ba5c0cd0b9ea

    SHA1

    eab18844843a7a07ffe4a90a42e0054bc1f42db9

    SHA256

    dc9defe94e5c892715a40736cd1cd577f0eae31dfd3a38152e77e84e46b4be05

    SHA512

    033bcbdda981d0212852c249133a33dfb75636b99fb14b2fc246e994399c1b679cdedc09c3c6732079a46a9c652d4480ffa59d8852ce58a9fe7266a6e4f52f2c

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    d9707dc1bc4bbbb7aeb53c259ead0b14

    SHA1

    21861e52bec3ba03427afe396d9259dab09d24f7

    SHA256

    fa909eed178ad2d5f32b55305fa57361376f59547b5914dcef57298c286d4a82

    SHA512

    0eab9a287f825b237afe6b13a841707040a86fca64ff82803bf9a2e54e2619f65fb256c2e3fd4edf87270518ce8b4e207847d58061548a0d0f43d07dd39c8094

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    8ca5ebbf7c0599bc7930e74dc51a4704

    SHA1

    a2d2c79273bb0aaa943e6a617ceafd08cef99ac2

    SHA256

    804839663bb036dc8b159c9e84cf56ca2a1f17448f8531afd255253aa2e4d21f

    SHA512

    4b18470323ade2a6d92f2b5fd7025990cb5358f65b19e752f9f309461f7e5bfc07fdcc3fb780cfd9c74dc503d3fef8cf39edc666a669fb1eac70c06fe0bf6731

  • memory/2856-39-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-38-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-44-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-45-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-47-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-48-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-46-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-51-0x00007FF858780000-0x00007FF858790000-memory.dmp

    Filesize

    64KB

  • memory/2856-52-0x00007FF858780000-0x00007FF858790000-memory.dmp

    Filesize

    64KB

  • memory/2856-41-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-42-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-43-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-40-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-133-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-37-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-36-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-102-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-35-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-108-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-109-0x00007FF89ACF0000-0x00007FF89AEE5000-memory.dmp

    Filesize

    2.0MB

  • memory/2856-131-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/2856-132-0x00007FF85AD70000-0x00007FF85AD80000-memory.dmp

    Filesize

    64KB

  • memory/4296-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB