Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 08:46

General

  • Target

    cd9e021b58de5ccc6a2fbbe41b0a2bab.exe

  • Size

    104KB

  • MD5

    cd9e021b58de5ccc6a2fbbe41b0a2bab

  • SHA1

    9db7e920c7cc4eb539b0d1ef97582700d34cd512

  • SHA256

    16ffc20967f73bd4ff0229972cb7732589f2fd96336505bdb25544cfa0912844

  • SHA512

    ef8ce8b51ea8e95aa44730ffd379f51d5cc8065b27d785d2a439244dc1816a4e7465728bd69536481a3323cecffa1acf47c00261c0c85ab0b1a5527e297d341c

  • SSDEEP

    1536:9yVOmTBYa0XkuDkxP4P2g9iB0orjaJLtgb:8dpckuDkxP4Hb+aJLtgb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd9e021b58de5ccc6a2fbbe41b0a2bab.exe
    "C:\Users\Admin\AppData\Local\Temp\cd9e021b58de5ccc6a2fbbe41b0a2bab.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\G7RJMB.EXE
      C:\G7RJMB.EXE FDONSZUYCQS
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2740
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "c:\windows\fdonszuycqs.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2056
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\2Y4K97U98.BAT
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s itss.dll
        3⤵
          PID:2628
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2644
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s scrrun.dll
          3⤵
          • Modifies registry class
          PID:2680
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s jscript.dll
          3⤵
          • Modifies registry class
          PID:2560
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s msvidctl.dll
          3⤵
            PID:2596
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
            3⤵
            • Modifies Internet Explorer settings
            PID:2432
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
            3⤵
            • Modifies Internet Explorer settings
            PID:2984
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
            3⤵
            • Modifies Internet Explorer settings
            PID:2732
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
            3⤵
            • Modifies Internet Explorer settings
            PID:2460
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s vbscript.dll
            3⤵
              PID:2452
            • C:\Windows\SysWOW64\reg.exe
              reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
              3⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:2604
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2780
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2940

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\2Y4K97U98.BAT

          Filesize

          1KB

          MD5

          91d17ba69c29686ec8929044ff7fcf56

          SHA1

          db0f273606c7eb9825f57caf9338abf0981d477f

          SHA256

          2f62c3275b2af56b9801147a9c876bbb9b4cd9ed284f4355d9b66dd557c41eb7

          SHA512

          171213b4095a7fb299a2ba35da4ed7ac201844b05d5329b08a0f5fc297a1971751f04579a9e7925d5d2c3438696eb8fecf4f27869cda16fca030c1a50cb301dc

        • C:\G7RJMB.EXE

          Filesize

          10KB

          MD5

          19595de7fbed86bc29d5d9547073ca63

          SHA1

          8fa2edaa9e3edefeb672bb3139436fddc5bb3d27

          SHA256

          e3c841c3b05305890c2496dadf759a8077860f4b1e6a73a12e90bd97cfd95b44

          SHA512

          740d859c835fd168b6f9951475fd5054515fd83150e655ab6f3d24b320ef235a6af711a08adc615b1186c06c0c2ef5480152c6b53cfcafbd8fa79a5133916747

        • C:\Program Files\91ETHXADKJ\HSRJX2I.EXE

          Filesize

          104KB

          MD5

          cd9e021b58de5ccc6a2fbbe41b0a2bab

          SHA1

          9db7e920c7cc4eb539b0d1ef97582700d34cd512

          SHA256

          16ffc20967f73bd4ff0229972cb7732589f2fd96336505bdb25544cfa0912844

          SHA512

          ef8ce8b51ea8e95aa44730ffd379f51d5cc8065b27d785d2a439244dc1816a4e7465728bd69536481a3323cecffa1acf47c00261c0c85ab0b1a5527e297d341c

        • C:\Windows\FDONSZUYCQS.txt

          Filesize

          104KB

          MD5

          97a9dc422523b7b7106565ee8a4e8ac9

          SHA1

          6183c83b0bd90bdd9f9504b192f84488d10bf594

          SHA256

          dd81008218161e65ccab6b6420c9ffe4ae1a7f19f90402adaaef19a20efa8a26

          SHA512

          18ff0a6d085040c06bd16bcefb2c106142d217ce3431515300dd07baa4dd5756fcb9e4d71f27a71893852a16e25e4695ca3cddf031553a8ef1268a8e36846d0e

        • \??\c:\windows\fdonszuycqs.dll

          Filesize

          28KB

          MD5

          ecfee270c2d71fbfe96568bd1e214665

          SHA1

          c6ebebe2e6313fee775454451fe8cf460733939b

          SHA256

          fcfba5ab83249f8335eed513d3541833fa612d6e483bc77417c55ac6732b78b8

          SHA512

          2ef6e08a7fd7915e857877ce5bcc0812fbb18bd69c840fce57d01363b70ea503ecfffde3b03af576655011220dd4f4e730d56be5f9985c240d08303b23564078