Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 20:13 UTC

General

  • Target

    21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe

  • Size

    163KB

  • MD5

    2137ef742d12377c9942d0f885706b08

  • SHA1

    bda09bfff8e2feb4f389a3038543f8a45a41d358

  • SHA256

    21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391

  • SHA512

    0cd98602bff81e068ce13c9f6486601c34647897d603ee188d94322d49ea6c821df2de72b09f2c3f5140e7d1d3e29190ebaa64a3fa73c6c78c44eee606073b9d

  • SSDEEP

    3072:/2r4q/0U64WFO7y7Z/SBmltOrWKDBr+yJb:/2rN/7D7y76mLOf

Malware Config

Extracted

Family

gozi

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 28 IoCs
  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Detects executables built or packed with MPress PE compressor 14 IoCs
  • UPX dump on OEP (original entry point) 14 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 32 IoCs
  • Drops file in System32 directory 42 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe
    "C:\Users\Admin\AppData\Local\Temp\21e14ffc365273b956e176844f2435b571f37eb81a1e571308537b9f9ef88391.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\Gphmeo32.exe
      C:\Windows\system32\Gphmeo32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\Hiqbndpb.exe
        C:\Windows\system32\Hiqbndpb.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\SysWOW64\Hkpnhgge.exe
          C:\Windows\system32\Hkpnhgge.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Windows\SysWOW64\Hckcmjep.exe
            C:\Windows\system32\Hckcmjep.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Windows\SysWOW64\Hejoiedd.exe
              C:\Windows\system32\Hejoiedd.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2588
              • C:\Windows\SysWOW64\Hobcak32.exe
                C:\Windows\system32\Hobcak32.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\SysWOW64\Hellne32.exe
                  C:\Windows\system32\Hellne32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1568
                  • C:\Windows\SysWOW64\Hhjhkq32.exe
                    C:\Windows\system32\Hhjhkq32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2664
                    • C:\Windows\SysWOW64\Hcplhi32.exe
                      C:\Windows\system32\Hcplhi32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1188
                      • C:\Windows\SysWOW64\Henidd32.exe
                        C:\Windows\system32\Henidd32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:1776
                        • C:\Windows\SysWOW64\Hlhaqogk.exe
                          C:\Windows\system32\Hlhaqogk.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:2168
                          • C:\Windows\SysWOW64\Icbimi32.exe
                            C:\Windows\system32\Icbimi32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1424
                            • C:\Windows\SysWOW64\Idceea32.exe
                              C:\Windows\system32\Idceea32.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:568
                              • C:\Windows\SysWOW64\Iagfoe32.exe
                                C:\Windows\system32\Iagfoe32.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:848
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 140
                                  16⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Hcplhi32.exe

    Filesize

    163KB

    MD5

    f17bfdab1a01c61359d659ea5baebc6c

    SHA1

    037a53308f3fd7768e59757e6bf151b127bfd82c

    SHA256

    3dfffbfe1c82c2272a339ed2563e914e40dd1236370bd1d4133dab92df9bf00e

    SHA512

    2322c123880ece91e4bba75980536f36cc0fe376e770525c97f4344d5e3b85c9c4d430a4e5d24e29224ae20bc52c212565b2cb3fd1e2c87c521b19873a7897f0

  • C:\Windows\SysWOW64\Hellne32.exe

    Filesize

    163KB

    MD5

    5a5951908ef80b489863da5c2f12e68c

    SHA1

    561955ea314b2e324b084c18b82e2bdbcb19ebb0

    SHA256

    bb5d07fcfabe96ae9e481aa955030a7149ec8d1ebf3f69b2ca5d747b5ebac8b2

    SHA512

    0b85d54b8177a77075233c7cba809e10d4b9675484db3ff28a106800c5747cbfd36c9ba849004ef044789a78dda9382f59de9eb18c8bf3684ef17f92b683ea16

  • C:\Windows\SysWOW64\Henidd32.exe

    Filesize

    163KB

    MD5

    e67f14167bc139231be3e808bc8b5bf6

    SHA1

    dd9135dfde867ec20f7a6f32930324b54421aa55

    SHA256

    f28d7d6a11d143a4a0c8c6a71d15ebd37ffba6167f22e7f249994f737f998f53

    SHA512

    40268d24c36c501e00012f24ecf9abc6a3a7f4ff0690201e525463f985f3af2b1cb452d42b856f1ab5e329283f8c5ac375369023108a037164f7468cfc1280d5

  • C:\Windows\SysWOW64\Icbimi32.exe

    Filesize

    163KB

    MD5

    cd7229bea590f9d75f1e4754fb0c5b0d

    SHA1

    e1f141a88d2c5204b119501d80fbaae14282c480

    SHA256

    25eddc3e71edf88eb85f86a5045b10feef98ae5b704b9ce652523bcd48f43eb0

    SHA512

    83893c4d4470da917dab6721425aa1d85a542a195b9f75517c067f4c73071cf7efd9d3b331e9a20df5b0863d54c0cce7e81524d4877b1087dda2426a49ea6c7a

  • C:\Windows\SysWOW64\Idceea32.exe

    Filesize

    163KB

    MD5

    a46a090c28770dcc515cbd36c40e1c8f

    SHA1

    25f8d27bd51adf425a2d66f2b1997a54500e9cd7

    SHA256

    11ffb21f0472a638de3d4e11e858447da69c60fbac5a5367bb5273920a2cc328

    SHA512

    0da5d0b3a8d965708ce3dbaa4a44cf1fb138ce8330034d174931e1bec9303c7fb2d020fa5221f8112125138a9d312d61b2d7f0e21e2f1d3ea64ff9304a9c2a93

  • \Windows\SysWOW64\Gphmeo32.exe

    Filesize

    163KB

    MD5

    dd581aeca506acdc49be883426e7def4

    SHA1

    16ff6ccec7822bd899d2172322cc685ca33dcd97

    SHA256

    ceb1b775ee0eae4f071ec20e973c36ccf1ddf5a5fe9afdfc578847e3ee9e8922

    SHA512

    28c3602d92fe84ac890d934cb1fbc53dd70f19c75ab341ea816c27a106dd8be42664e8a0c12ab10d132db42a7f298f405f8241bd4c124e50ab4ebee163354103

  • \Windows\SysWOW64\Hckcmjep.exe

    Filesize

    163KB

    MD5

    ba89b7db39cd54f515797b9a45a5784b

    SHA1

    c45ce9b3d994d94821a100d1e5b1970dcb10c8cd

    SHA256

    3b1972ed5f9ed296d3739ad0703d8f8c3b1814af335169f71da7c079dc40424a

    SHA512

    fdde0265b4ff692695a949d9848708e70a6c27f065cae0c1004d8a2b30159356e0bcdde3e447af14452d7a00561cc98c57fcd6426c165d980c4760699429df1b

  • \Windows\SysWOW64\Hejoiedd.exe

    Filesize

    163KB

    MD5

    010818adc9b964ab4a122de8c110da6c

    SHA1

    a6b07aed4d559e021a671adddba3b2b55c8b059f

    SHA256

    425f901c6c5b76766ae75077bccb69ac3eb0313b021933208ed4584ed1b235f8

    SHA512

    2ab2a2a493d77e1b0a4bed50783c73f56f643648829342336fe5047cb398d92eec4b71e751fd6ca71e31e4a6ed29720b2667ec8b18546439866373957d294dc6

  • \Windows\SysWOW64\Hhjhkq32.exe

    Filesize

    163KB

    MD5

    02bce81aff4f0e21ca6f542671b994a2

    SHA1

    fc36b27123b5cc59e91b096712b0d25cd5dc091a

    SHA256

    3a01f8430bab9171432617105f62596a280134ecbc1085b4fbc509955ede10a0

    SHA512

    481bc9d8885603b5b8a1e673d8b7d82e45d6836ee29fe4020e0de6a28c2bd1ce83b60cb8aac8f77e8a7ce9c7716675d15235b9ee73607f89c1a91e30b8a63c35

  • \Windows\SysWOW64\Hiqbndpb.exe

    Filesize

    163KB

    MD5

    04c1a2c12586c5ac7b187e01f4b49119

    SHA1

    47a25cb2a32af14c86a35db93c29c64a88aa8ed2

    SHA256

    313f6b7c35b2eb829abbe2ce2e0cc910dc1acec747cdb6ccbb8b890281592e80

    SHA512

    95a8c3164d24dbab7f0f55e95c58c29b5a4bc131710d13177b6a45e2ad65a0a74e3076e440991df638381d5353e01fb509c5310440addea3003e90f403526abd

  • \Windows\SysWOW64\Hkpnhgge.exe

    Filesize

    163KB

    MD5

    1e4e4033fc578f3f62518d9fc82645b1

    SHA1

    61f9ce94f32a15ca0bacb6758d31f04a9a186bd5

    SHA256

    8d70fbd200d679dbef76d48300b1fe76921ab2500b090a106bbdbcdc30d35e50

    SHA512

    c6a9ca40df8fe3f9e024095babd9e706bf599cc0cb28b7ecf83301e81b45627bd1a3c8a8d51c284669da9ec4e313f5783226aff835cd76fd311c85b69911d7c5

  • \Windows\SysWOW64\Hlhaqogk.exe

    Filesize

    163KB

    MD5

    d4d1e28acbe5f3aa14372dd505473da2

    SHA1

    d6ab7184e4098acaea5d14d79334b02acb996a81

    SHA256

    369ef699711dfe96d679787f214eb0e1b26fc0da6f1f44b7a72c3cf2e54c35e6

    SHA512

    34d52235dcf2e8fbe0772b320cdc0baf220397e31fa73d6798700b6712b16b410d6f1ae872d3470ddd04959a64e7e0343640df7d3550e2ece9ea6228632da745

  • \Windows\SysWOW64\Hobcak32.exe

    Filesize

    163KB

    MD5

    8c3de4dd072a4bec42ef6b71aeb9e221

    SHA1

    b9fc089b66d927c5fd5250c766328d5f3a5ed074

    SHA256

    b1f65fc4b4aa8f56d7bca26eddd48421ded5c56b5052696fd75de9d9837b68d9

    SHA512

    bcfaa121b30e65e714f68e2b35f32a572733f412746ff8c6c6bb7cc03f5978e34b762f0e9b426ed1972bafd1fe5b8138b6e4f763ed4f289c781a1eb66adf785b

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    163KB

    MD5

    862cc47f8d17bea16596987a098839aa

    SHA1

    8376df2f66ec9d860d03e0adf86a7485911d24a4

    SHA256

    835ea056b1a9cdf8f88001f5d648af802ec9f1a4b47b6072ce3411c4647954df

    SHA512

    8c3d66d3dfa79bc79c11667a4ce79b7c35daa84a45135ab45e92482044d6f40fa60853db6b7c6f3629d3af91e21954c691ab0b8840ec8761223a4ed05635d745

  • memory/568-246-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/568-180-0x0000000000250000-0x00000000002A3000-memory.dmp

    Filesize

    332KB

  • memory/568-181-0x0000000000250000-0x00000000002A3000-memory.dmp

    Filesize

    332KB

  • memory/568-167-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/848-182-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1188-118-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1188-236-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1424-242-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1568-91-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1568-232-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1692-6-0x0000000000250000-0x00000000002A3000-memory.dmp

    Filesize

    332KB

  • memory/1692-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1692-218-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1776-238-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1776-137-0x0000000000290000-0x00000000002E3000-memory.dmp

    Filesize

    332KB

  • memory/2168-240-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2584-27-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2584-222-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2588-66-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2588-228-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2616-224-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2616-40-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2664-234-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2664-116-0x0000000000260000-0x00000000002B3000-memory.dmp

    Filesize

    332KB

  • memory/2724-226-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2724-65-0x00000000002D0000-0x0000000000323000-memory.dmp

    Filesize

    332KB

  • memory/2784-220-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2784-21-0x0000000000320000-0x0000000000373000-memory.dmp

    Filesize

    332KB

  • memory/2784-18-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2876-230-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.