Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 22:19

General

  • Target

    493eda0e24cea8fa7eb424854094f31b2381deb4ebca7a7a4c5195ebca3354f7.exe

  • Size

    255KB

  • MD5

    cd2cfda14fdebc2474a5cf7c4d1524df

  • SHA1

    87feb6ac2070ccb2dcd9e44584e3ecedcabb270a

  • SHA256

    493eda0e24cea8fa7eb424854094f31b2381deb4ebca7a7a4c5195ebca3354f7

  • SHA512

    3b23f50bf703a30813cad819ec428786ca9a55654174fbd287c188e81ecd2fef1aae17c7e80cf1941e68a5a7984ae8f3ade1f0e78c6567f75fc2f124d9cf5933

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJL:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIQ

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 58 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 24 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\493eda0e24cea8fa7eb424854094f31b2381deb4ebca7a7a4c5195ebca3354f7.exe
    "C:\Users\Admin\AppData\Local\Temp\493eda0e24cea8fa7eb424854094f31b2381deb4ebca7a7a4c5195ebca3354f7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\zfrljscnzg.exe
      zfrljscnzg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Windows\SysWOW64\ckyjcfzh.exe
        C:\Windows\system32\ckyjcfzh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3060
    • C:\Windows\SysWOW64\bojnhrwdzcgpaxd.exe
      bojnhrwdzcgpaxd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1176
    • C:\Windows\SysWOW64\ckyjcfzh.exe
      ckyjcfzh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2464
    • C:\Windows\SysWOW64\bapfnmvwehamo.exe
      bapfnmvwehamo.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2428
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2816
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      c026998b5a3086c48dbab7e020c2387a

      SHA1

      d64e244c1cd1ba435eb2410fb804f96babdd9a4f

      SHA256

      e5c6d0e4ca2c7de543a77f9b3971d24ad1db588b1fd7927c8ac2db1e2af96dbe

      SHA512

      6d0b7bbeb96b9e9468f7553802ebd73e830393e4fd8c5b8e39cc95aaeffde6de2a7ec1415a199ed1505283345e9454f20ee2a50d303fe679a935c561a4f5db0a

    • C:\Program Files\MoveComplete.doc.exe

      Filesize

      255KB

      MD5

      9b6e47f55b40d08efb1cddc995bcca9f

      SHA1

      6cc2e39dbe062ef820fec132b836b9f5c9d69048

      SHA256

      5a0ab4fb7f38a234ad84e99baf18d34cecb6fff9cf102c337168b9cf51e8ac75

      SHA512

      53f77a27a8b48f33bc27c7aabd065009e818d92cf4d8b45ac151e78b7f1717b02d4cc66931d6cf50d9295e9287a4baf1d34142041e3aba3939c6225550460ffe

    • C:\Windows\SysWOW64\bapfnmvwehamo.exe

      Filesize

      255KB

      MD5

      e195420f6e39e8c79affbce5384325ae

      SHA1

      241989747e9905dd1a11d3e6a40d641421a5163d

      SHA256

      823668cd098c53415b774a11ea8bc0dadf3e81948429e4ff57bbff2c822639c9

      SHA512

      3c36a31297024c50ba582493ce3333fd8793e7b85680a079827cac14f37456bbb8e6e9811d76c557fba6b48df193d9d4fd1f5a5c2a232df8493dfea4bf9a7bd8

    • C:\Windows\SysWOW64\bojnhrwdzcgpaxd.exe

      Filesize

      255KB

      MD5

      e21d07936e91772f15ef92d59dea2480

      SHA1

      97789201f3ae415c5092276e71feaaaa0a726190

      SHA256

      f0cdeebbd43b2bae57ea224ee0265cb4582dd98031e3a35e5f287fd6170164c5

      SHA512

      6f22a93249a948bed7814bf98c72ff1216d97cc753b2ee1331ea82190009ca2d39369c643bbed91cb38fbe1c72a237fb45a9f8e69bd3b8512343d441914b63bd

    • C:\Windows\SysWOW64\ckyjcfzh.exe

      Filesize

      255KB

      MD5

      fc7457152f7385c70e0bfd2e919a9cdd

      SHA1

      120d3f3361eac805e14c1deaa3abfb8ea6db8a77

      SHA256

      1dcde94237bd2ade232ff08e04e7bdcdab5072d9736d090582400bd05bc1b2ea

      SHA512

      e13fa48563ae662e577216d2d95df6bbe49dcbdf9940bbd963287d594da77b026e04a7a4cbfcfc27bcd6889d4d4ff9deb4b810a86b41e3467bf12bd005843226

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\zfrljscnzg.exe

      Filesize

      255KB

      MD5

      d3c41e5023ce4fbb8da515047621f2d3

      SHA1

      47b179636b8ea419ca91ac50bb7272e8f94871a1

      SHA256

      fbc25f92b1926b08c9607acb841dee02afa331786ad6e41146245fd01952ec27

      SHA512

      9e6a5b2761e86c061b939a4ae95fa81714cee147c03e61a101fe45b6e9d4e331701b08977fe0bf234cc5f76418076b764b1d0429c50d5623c5c338782fca899f

    • memory/1176-137-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-109-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-28-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-131-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-128-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-125-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-122-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-119-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-86-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-93-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-112-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-141-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-82-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-134-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-106-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1176-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1452-139-0x00000000040D0000-0x00000000040E0000-memory.dmp

      Filesize

      64KB

    • memory/2312-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-22-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-85-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-140-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-118-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-70-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-136-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-133-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-92-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-121-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-130-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-111-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-108-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-124-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-127-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2312-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2408-0-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2408-46-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2408-35-0x0000000003370000-0x0000000003410000-memory.dmp

      Filesize

      640KB

    • memory/2408-49-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2408-26-0x0000000003370000-0x0000000003410000-memory.dmp

      Filesize

      640KB

    • memory/2408-20-0x0000000003370000-0x0000000003410000-memory.dmp

      Filesize

      640KB

    • memory/2428-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-41-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-120-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-113-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-110-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-123-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-142-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-95-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-107-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-126-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-84-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-129-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-138-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-132-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-88-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2428-135-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2464-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2464-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2464-94-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2464-83-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2756-50-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3060-99-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3060-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3060-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3060-47-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3060-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB