Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 05:16

General

  • Target

    fde01812ed8603e40847b742e4e43996d7b7c30ca52bcd0add0530d22192de32.exe

  • Size

    768KB

  • MD5

    b2979156df25d1cb99f35ed44102a3b7

  • SHA1

    4ea4b2ba711931e39ef47f3498b982747d59f89b

  • SHA256

    fde01812ed8603e40847b742e4e43996d7b7c30ca52bcd0add0530d22192de32

  • SHA512

    5fb3082e664afcb3db2755aa9f36b220161811bf98cb8747481d16da7daf34894ca6fa5e7fabe4597bbc4fba44367bfc60dddc0643d8ea637e7e2a170d182380

  • SSDEEP

    12288:F05LZ0g9evw6IveDVqvQ6IvYvc6IveDVqvQ6IvBaSHaMaZRBEYyqmaf2qwiHPKgV:6d99q5h3q5htaSHFaZRBEYyqmaf2qwiv

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 12 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 18 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 21 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fde01812ed8603e40847b742e4e43996d7b7c30ca52bcd0add0530d22192de32.exe
    "C:\Users\Admin\AppData\Local\Temp\fde01812ed8603e40847b742e4e43996d7b7c30ca52bcd0add0530d22192de32.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Windows\SysWOW64\Cmbpjfij.exe
      C:\Windows\system32\Cmbpjfij.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Windows\SysWOW64\Cfjeckpj.exe
        C:\Windows\system32\Cfjeckpj.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Windows\SysWOW64\Dfonnk32.exe
          C:\Windows\system32\Dfonnk32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2864
          • C:\Windows\SysWOW64\Dmifkecb.exe
            C:\Windows\system32\Dmifkecb.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:5080
            • C:\Windows\SysWOW64\Dlncla32.exe
              C:\Windows\system32\Dlncla32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1304
              • C:\Windows\SysWOW64\Dbkhnk32.exe
                C:\Windows\system32\Dbkhnk32.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3024
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 400
                  8⤵
                  • Program crash
                  PID:4072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3024 -ip 3024
    1⤵
      PID:1156
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:8
      1⤵
        PID:3952

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Cfjeckpj.exe

        Filesize

        768KB

        MD5

        58305c730ff68aa1647e612783e6393d

        SHA1

        6afc4acd87e799ab51154bdfbaa0f69e05a002dc

        SHA256

        3fd97e7f2581bfb82465793b736bc2292263a283bee30bc5f7feed0af3db2111

        SHA512

        6d5b4723eae4c183b34813582e92ff76c4fca06f654af8cd190584dbb3b4d3ade4275bfd7d1f273eb5bfec7644b94f69b9c637ac05674b5373ef94e9b54bb988

      • C:\Windows\SysWOW64\Cmbpjfij.exe

        Filesize

        768KB

        MD5

        f5fb75947dbb34256169911e2c369ebe

        SHA1

        68285d176123ae2f260561fe2409d0c83e34ac93

        SHA256

        0402d0c0be62e56b917bc9545d75a015e43966c4df668c48a4ae9fc02856f23f

        SHA512

        d3dafa3aaa24ef6faeca5ecc8ba3113f3f89c0b3370f71b5e873e0717d49d587bc1cb7caab2f6ae59544bf764acc99fd9cdad2dce90a13b645cfd1904a97327a

      • C:\Windows\SysWOW64\Dbkhnk32.exe

        Filesize

        768KB

        MD5

        8b5f662b862fdc739ead13a5a7dfc377

        SHA1

        dec23073ddff6630decbd312c1ec084612c5531f

        SHA256

        0b99ca32862c00e376f840dac8c3627301110be59b39bd841bd0497faa7a1d63

        SHA512

        6fb0491fb4e169201490fed7686e1d83ada78636dbac52ff651bb8d522ffe9a6c49bfcfcdd7be0e7c8900a269a6b7c96ad49d76b15a89cfa77708392ace6d77b

      • C:\Windows\SysWOW64\Dfonnk32.exe

        Filesize

        768KB

        MD5

        e56a75d51af8f6c256230334e5f8a50b

        SHA1

        4cc86b6d058b084061aaed90a4ec4b587dad8e3e

        SHA256

        34b0e0e050f2aa69bb71022a1e45ae7a8c5ec537c0884dc37f5f289245543e57

        SHA512

        9a6228a3546f4fffbb3a6702a8fd327cfd1f4fc38721c5a752ddd2670cefa6cb089a8daad064f56d1ade566ae7d1aba6c6398d407a16a9e9ddc889f0b0864251

      • C:\Windows\SysWOW64\Dlncla32.exe

        Filesize

        768KB

        MD5

        10cfb703c729030112ca07489faa0120

        SHA1

        6274a1fbfae6a1b015013c56fea0a0a9dcd71519

        SHA256

        bc5736272cde9f6947d97f2e1e0131b8ae03a7417328efc7a44b1e1b42d51327

        SHA512

        59d4c0fb27fcd621f90458c23919216d2cd2971e908ca5701568ac2ade53070672953a6d8b75c7525ccf50a1f0e5af8a73e13fc8e16ee39c2d87367fe0dc12f3

      • C:\Windows\SysWOW64\Dmifkecb.exe

        Filesize

        768KB

        MD5

        a159ffe90e101a49da065266aa7b245e

        SHA1

        e6318ec2b2fc156d98301108bbc825f14bdbb09e

        SHA256

        2768b3e2487b3a15bec4dd39f40e6729a21e590ca73a464d5faeb04a196a5067

        SHA512

        6f7eeb203ded50fecf30e137a5488cb95031bb827331cae84544f6c01ed38f0d19b6ad0d7d2fcaaca4fa3bf2be5b4240cb58afb3c9b55cf3b653fbbac49bd179

      • memory/1304-52-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/1304-41-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2864-57-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/2864-25-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3024-53-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3024-49-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3040-17-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3040-60-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/3708-14-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4308-62-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4308-0-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/4308-1-0x0000000000431000-0x0000000000432000-memory.dmp

        Filesize

        4KB

      • memory/5080-33-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB

      • memory/5080-55-0x0000000000400000-0x0000000000433000-memory.dmp

        Filesize

        204KB