Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 15:39

General

  • Target

    c0f5f6ce7a241bda371348f17923016a.exe

  • Size

    512KB

  • MD5

    c0f5f6ce7a241bda371348f17923016a

  • SHA1

    c8550edbdb6e316214dde0aa58184f78c687e59d

  • SHA256

    dbdb6bc32647ab85b7ec32c6b242c13cf23108e3407f4cd4510b3f12b7ae9536

  • SHA512

    24945ceadb37098bbeee2f62f12bce4e3179e6fcd71033106838dab30ca69bb269fe1b1fa4b7fa676e8f7e44ccda6b289071426e383a889a57820f8caee19335

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0f5f6ce7a241bda371348f17923016a.exe
    "C:\Users\Admin\AppData\Local\Temp\c0f5f6ce7a241bda371348f17923016a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\vvarxanzmf.exe
      vvarxanzmf.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Windows\SysWOW64\wdbhgijm.exe
        C:\Windows\system32\wdbhgijm.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3384
    • C:\Windows\SysWOW64\leufbphksnsjqmg.exe
      leufbphksnsjqmg.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3152
    • C:\Windows\SysWOW64\wdbhgijm.exe
      wdbhgijm.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:688
    • C:\Windows\SysWOW64\hkfhkcnudmldk.exe
      hkfhkcnudmldk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4928
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    d43b1506a5ec519c646c1fc851ad43b1

    SHA1

    480ed525287c1295498d917cf84270859365deec

    SHA256

    7fe840942c090b767243d8f41f099841663a917bc57ba3a99d4f9b02ba8dcf44

    SHA512

    8eacf47be087d9b4f90d6f50f9123614764618f8580cfe9f9fa9afdb0db38f4277e3e3d2e2b39b3a4a5ed6337139f1f9a12e69180788d14a850c24a723dc2915

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    d43df5847bd7beddbe56dbfe03411185

    SHA1

    d3ee9309c10279b1a0bb5195826595ed110b7df9

    SHA256

    a11e34371c4dcdb1906ce7e6b6d126e08509c3357b384c7a7867c17bab02b7df

    SHA512

    ad0d6db7da984929041f7e2852ac1f52a6775d2dd3c662d8d07a269af9615559c01ab8e5c155302b81d3eb6aeb786ccc4751fd02feff78fe69354536cb6839cb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    de412aa781c2ad013c3fbddd181c040b

    SHA1

    e569084a9f63e980b7863cd5eed349194f8dde06

    SHA256

    bb59adb62870b25ca850b717ecdb85dfe657d8a963ed9c3b8b175bc8b86ed624

    SHA512

    1cf477b0cd243a2e309ced4f1bfadbe8cfc269c3bd515ba4ed5eb30141804d6fecf0fdc7cd748d7ab4e7f637a8172a6e06c0f714bb3dbbd7000762191dbc0734

  • C:\Windows\SysWOW64\hkfhkcnudmldk.exe

    Filesize

    512KB

    MD5

    73fc2bae12e40e87475a656f34e31155

    SHA1

    caecc0398847c84c3a9cbeca853841190ca15363

    SHA256

    20a835fbcce4010b1cde2c220a9d0ae79bd922943349c8aa2082fd2e3b8f75e5

    SHA512

    c5cc38c173fbbfedd56ed573914f96a62ec54c75155a704c9fbd077113766077e77ca66360ba893af8f47fcc84c07a1b7440c15112a531af9c82d77681894f96

  • C:\Windows\SysWOW64\leufbphksnsjqmg.exe

    Filesize

    512KB

    MD5

    83ff6359861692fb468c2ef9885efc61

    SHA1

    d498f94320a023789d18cccd23086e9445388b4e

    SHA256

    794692d4869ad5ef06354b8e406dbbee06bfe4c19bdfcb34aa7e6e6ee8537687

    SHA512

    00a231acb178deaca52a012e5608f0abb7ff3eb16856e0edb0b10f983bc2cc3e8435c58708693cc7319fd7a395cafef613b38868e3debd385514cc5431c9f1cd

  • C:\Windows\SysWOW64\vvarxanzmf.exe

    Filesize

    512KB

    MD5

    5967ba3a7e4cf2b19af6672de96cc625

    SHA1

    3568cbf534702d4e38acb4e9accd81f79574c1fe

    SHA256

    f6539ab7f82d9d14a4828590daf0448a6f289e80600d265c1e00dba0346a7855

    SHA512

    601a5d41c303d5681a1dc9f694d6b7d2276c5750ea2f21014fabe815ecaec7da856302c157c8b1ffd818f473170392155a648f809119ecda5f48fdceb04a783f

  • C:\Windows\SysWOW64\wdbhgijm.exe

    Filesize

    512KB

    MD5

    c9a74d57900e8ac9ab40f7438d877f83

    SHA1

    f8fbcf66fcf3f6837e6cbc226bbf39ee3eb7fe3c

    SHA256

    e8c1a60756ed2682007c58191a3448a12bbd9782863c8eb3f924a9ec489e6774

    SHA512

    d2733cfea9c4903296ae5cc2bd7f5049d9dc7bc252f536f4d8d070afc54b345028939bdc1f2481fec0ab98c87f65fe67b8e6126dd37c808049258f3ab5871e51

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    8fe7acdf2dde6c8bdf7039567d423210

    SHA1

    17595cf304d74e5635ad4d7c14c78188e7cac331

    SHA256

    7a67a71bdb4f352c5efe87d23a176cdbf980bed0b8a48c207c6554ef6031ef59

    SHA512

    c743657249fb98a87ae7da5d2bbebbb0b8fb3985ad085dd5465faf414beef00848ea2476ff1ff21f24b750f02d90790c465b00ed023363ecb640b1c88e5861e8

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    211bab3da602011e75bb00021d2737a0

    SHA1

    e093d6957e157c2c3490d5225b7c7bf68dde2024

    SHA256

    0d767552ab01da7a3efb3c60a6c77e2b4d1b91ba9295e4b20c936214b6d67fed

    SHA512

    2ba49660eb751765580e5c89c365cad15ac22c3f66b7312ba772687dbe6cf65b7147a00bbb0604cfda030fb1d6c21daec8ba0eda954825333e5bc011d17ee793

  • memory/1912-38-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-123-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-43-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-44-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-45-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-46-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-47-0x00007FF945890000-0x00007FF9458A0000-memory.dmp

    Filesize

    64KB

  • memory/1912-50-0x00007FF945890000-0x00007FF9458A0000-memory.dmp

    Filesize

    64KB

  • memory/1912-42-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-40-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-39-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-127-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-37-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-36-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-35-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-101-0x00007FF987AD0000-0x00007FF987CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1912-41-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-124-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-125-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/1912-126-0x00007FF947B50000-0x00007FF947B60000-memory.dmp

    Filesize

    64KB

  • memory/2824-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB