Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 08:46

General

  • Target

    cd9e021b58de5ccc6a2fbbe41b0a2bab.exe

  • Size

    104KB

  • MD5

    cd9e021b58de5ccc6a2fbbe41b0a2bab

  • SHA1

    9db7e920c7cc4eb539b0d1ef97582700d34cd512

  • SHA256

    16ffc20967f73bd4ff0229972cb7732589f2fd96336505bdb25544cfa0912844

  • SHA512

    ef8ce8b51ea8e95aa44730ffd379f51d5cc8065b27d785d2a439244dc1816a4e7465728bd69536481a3323cecffa1acf47c00261c0c85ab0b1a5527e297d341c

  • SSDEEP

    1536:9yVOmTBYa0XkuDkxP4P2g9iB0orjaJLtgb:8dpckuDkxP4Hb+aJLtgb

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd9e021b58de5ccc6a2fbbe41b0a2bab.exe
    "C:\Users\Admin\AppData\Local\Temp\cd9e021b58de5ccc6a2fbbe41b0a2bab.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\YS8N7RF8304Z.EXE
      C:\YS8N7RF8304Z.EXE FDONSZUYCQS
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2268
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "c:\windows\fdonszuycqs.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4816
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\F8UKRTWB0S0P.BAT
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s itss.dll
        3⤵
          PID:4868
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
          3⤵
          • Modifies Internet Explorer settings
          PID:2204
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s scrrun.dll
          3⤵
          • Modifies registry class
          PID:2008
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s jscript.dll
          3⤵
          • Modifies registry class
          PID:4136
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s msvidctl.dll
          3⤵
            PID:5060
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
            3⤵
            • Modifies Internet Explorer settings
            PID:448
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
            3⤵
            • Modifies Internet Explorer settings
            PID:1448
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
            3⤵
            • Modifies Internet Explorer settings
            PID:1760
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
            3⤵
            • Modifies Internet Explorer settings
            PID:1828
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s vbscript.dll
            3⤵
              PID:2228
            • C:\Windows\SysWOW64\reg.exe
              reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
              3⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:4756
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:3176
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:1068

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\F8UKRTWB0S0P.BAT

          Filesize

          1KB

          MD5

          91d17ba69c29686ec8929044ff7fcf56

          SHA1

          db0f273606c7eb9825f57caf9338abf0981d477f

          SHA256

          2f62c3275b2af56b9801147a9c876bbb9b4cd9ed284f4355d9b66dd557c41eb7

          SHA512

          171213b4095a7fb299a2ba35da4ed7ac201844b05d5329b08a0f5fc297a1971751f04579a9e7925d5d2c3438696eb8fecf4f27869cda16fca030c1a50cb301dc

        • C:\Program Files\QSNB74R0VO\4816QTOV6PM.EXE

          Filesize

          104KB

          MD5

          cd9e021b58de5ccc6a2fbbe41b0a2bab

          SHA1

          9db7e920c7cc4eb539b0d1ef97582700d34cd512

          SHA256

          16ffc20967f73bd4ff0229972cb7732589f2fd96336505bdb25544cfa0912844

          SHA512

          ef8ce8b51ea8e95aa44730ffd379f51d5cc8065b27d785d2a439244dc1816a4e7465728bd69536481a3323cecffa1acf47c00261c0c85ab0b1a5527e297d341c

        • C:\Windows\FDONSZUYCQS.txt

          Filesize

          104KB

          MD5

          97a9dc422523b7b7106565ee8a4e8ac9

          SHA1

          6183c83b0bd90bdd9f9504b192f84488d10bf594

          SHA256

          dd81008218161e65ccab6b6420c9ffe4ae1a7f19f90402adaaef19a20efa8a26

          SHA512

          18ff0a6d085040c06bd16bcefb2c106142d217ce3431515300dd07baa4dd5756fcb9e4d71f27a71893852a16e25e4695ca3cddf031553a8ef1268a8e36846d0e

        • C:\YS8N7RF8304Z.EXE

          Filesize

          10KB

          MD5

          19595de7fbed86bc29d5d9547073ca63

          SHA1

          8fa2edaa9e3edefeb672bb3139436fddc5bb3d27

          SHA256

          e3c841c3b05305890c2496dadf759a8077860f4b1e6a73a12e90bd97cfd95b44

          SHA512

          740d859c835fd168b6f9951475fd5054515fd83150e655ab6f3d24b320ef235a6af711a08adc615b1186c06c0c2ef5480152c6b53cfcafbd8fa79a5133916747

        • \??\c:\windows\fdonszuycqs.dll

          Filesize

          28KB

          MD5

          ecfee270c2d71fbfe96568bd1e214665

          SHA1

          c6ebebe2e6313fee775454451fe8cf460733939b

          SHA256

          fcfba5ab83249f8335eed513d3541833fa612d6e483bc77417c55ac6732b78b8

          SHA512

          2ef6e08a7fd7915e857877ce5bcc0812fbb18bd69c840fce57d01363b70ea503ecfffde3b03af576655011220dd4f4e730d56be5f9985c240d08303b23564078