Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 19:22

General

  • Target

    bc99c4677a06951c7c1b7ce58f5d29d3.exe

  • Size

    512KB

  • MD5

    bc99c4677a06951c7c1b7ce58f5d29d3

  • SHA1

    7d7d01882e8cf2a5afc3324f88c21817405c5632

  • SHA256

    ce425c663951485304a21f3bd6bfb536f0c270478f411bafc09ebeea86324559

  • SHA512

    c216c2a0ce0dbaf52aae43a70a75f1ffbc812bc1e38057bfa3850dd7d996b48561d97f7240570a65780e30f317cb12a4dbc7357392cf9e967f52115ab29a9721

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5F

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc99c4677a06951c7c1b7ce58f5d29d3.exe
    "C:\Users\Admin\AppData\Local\Temp\bc99c4677a06951c7c1b7ce58f5d29d3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\SysWOW64\tiuhohagll.exe
      tiuhohagll.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Windows\SysWOW64\kfgporfc.exe
        C:\Windows\system32\kfgporfc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3372
    • C:\Windows\SysWOW64\rygjvdkvjstrajs.exe
      rygjvdkvjstrajs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1196
    • C:\Windows\SysWOW64\kfgporfc.exe
      kfgporfc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4840
    • C:\Windows\SysWOW64\fismwiebwrekz.exe
      fismwiebwrekz.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4332
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2096
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      a8564abbf3a5a915f3502fe604c318a2

      SHA1

      652dcca09125d88d1193abb87274c05c80177e43

      SHA256

      df9de67cac9dba235fe2b51a17a85aed0dc93ee70106371971b0366f9c7c189d

      SHA512

      593fc7261a39108c3531cae8688d414641c38227d7f671613ad8f41762fff4f901187ae15caaaf2d456382fa3842f47992c94e8cd8b88ba5b2a9c7b48673c44b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      a07bbfb2efc9e4ee265775dd461e4e64

      SHA1

      0e8f5b0bc497e76e8d7f36aa4c9e829c98d9be9e

      SHA256

      5e45af408ac7b2d3ed3bde1cac0cbb342402500381b38866cb9f4ec35c934ae0

      SHA512

      a2f1ec08de4e1b1c855628cffe3af8ef34fc53c5a9f59c528d6bdc8cba9c3a12f0acc4bf35fcda621a98b8953d12ba1b5335ab4704ff4428b72378b8fc12d51a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      4620e2ec0717585078343c079f63ff00

      SHA1

      9609e26e49a3b559f18028235c0a708b8d3a3a1e

      SHA256

      886e8ceabe51cdc37b4a0017cf87c7059f4b0e7430cd7d28238db01f1a858b13

      SHA512

      c3d52a09d7e9d7e0a22da341cf9f06f365778ceb96e3daa9a2a385b9d40848db022ae11d0b5e9a23e9a8fef11f08a01ccddc7d4dc093bb566b01d5135f12e915

    • C:\Windows\SysWOW64\fismwiebwrekz.exe

      Filesize

      128KB

      MD5

      33be84de0fa03c6883fec2ead970e3ba

      SHA1

      dbe35ed4343779aa93200c24966ccb805e18f223

      SHA256

      ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

      SHA512

      3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

    • C:\Windows\SysWOW64\kfgporfc.exe

      Filesize

      192KB

      MD5

      110f40dbeb901f612cee1dc242fdb309

      SHA1

      0d668d172ef81b3f17c1f870513988629c697600

      SHA256

      2776ac73ff5e792a5a804395643f25e611d6eb66037ffd261caacd95ae084b82

      SHA512

      076fda5dfa04f3c443f91657f607ef768185b7753767eb70d557635d398a76f85c8b3c19c7d864f9c342ced1af18c9c98f6f4da4b7bb86dca104230fa71b6df1

    • C:\Windows\SysWOW64\kfgporfc.exe

      Filesize

      64KB

      MD5

      d76d22b81130bc9206c7c947d7a9ea5e

      SHA1

      5956e88a6ec7949ce5a350e21703307d855f34b1

      SHA256

      b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

      SHA512

      112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

    • C:\Windows\SysWOW64\kfgporfc.exe

      Filesize

      512KB

      MD5

      c97d61ada1b5fbd6d806fc81bed04609

      SHA1

      42c284aeb7ee24c36c88e9d2f024fb6317884451

      SHA256

      76ed3377aafe6fed1553753a8860d9636338c3106ab3475e422570995c572522

      SHA512

      edaf4d831389f6b3e9d8e1b08db36e69d76b41e869cdfdbe592360d8e4971cb9df560073569791cd1c423f738cb1fe321f2a2c13a275719698c24e88d5cf8c87

    • C:\Windows\SysWOW64\rygjvdkvjstrajs.exe

      Filesize

      512KB

      MD5

      cef73be4ce53f36ed9c0aa88028a1f71

      SHA1

      e798c90b633d07a83d4693b0fd6d6530ae68c6a9

      SHA256

      02c24e83fdbd380f7f5f8c3558951f75294768444f5b7785cf0fb55ede7e19ee

      SHA512

      b857c905f9b157873503d83db30bd92c2c396a55194208633991e0dbc19d89974d5b1c65cb97383dbf936ab5437315e083bf3ffa79fba829ee31711418d0258f

    • C:\Windows\SysWOW64\tiuhohagll.exe

      Filesize

      512KB

      MD5

      8e2527158da32eeceecacb238fe7a086

      SHA1

      0f1c02831dbbb030c166fbb6a4f23117af272f85

      SHA256

      6aa51110532d76347b5a1aba8ba40e18df6f04bd7403d72b85a66ec63aef7edf

      SHA512

      ac252e02566cc983a2c7804a76d833c6952e828abc997a6d24884b918a22a9a65f1db861f12e54298367de8040746dbcaf871a188bde469900a80fbb3352010e

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • memory/2096-40-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/2096-41-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/2096-42-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/2096-43-0x00007FF9581B0000-0x00007FF9581C0000-memory.dmp

      Filesize

      64KB

    • memory/2096-60-0x00007FF9581B0000-0x00007FF9581C0000-memory.dmp

      Filesize

      64KB

    • memory/2096-61-0x00007FF99AA90000-0x00007FF99AC85000-memory.dmp

      Filesize

      2.0MB

    • memory/2096-39-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/2096-38-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/2096-37-0x00007FF95AB10000-0x00007FF95AB20000-memory.dmp

      Filesize

      64KB

    • memory/2524-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB