Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 03:05

General

  • Target

    c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3.exe

  • Size

    608KB

  • MD5

    11551100b5caf188919b0b123358f1bb

  • SHA1

    dd26d0ec4c80274e984ac2553f9f0510f68c22c1

  • SHA256

    c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3

  • SHA512

    11ad8a53eab762da1766a0b2fd423d338b1e8de0c396b5c6fc10ccdeb5cde6e334598465844c969414ba37f02e01d19215263a9084a4ea0c465e53e91d798de2

  • SSDEEP

    12288:NYBX/tQDwmHtOwu/ctCKaCDnEQvPg5I2R3yTx5KEZt5:NY2w+tOwuMCeEOPp83et5

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • UAC bypass 3 TTPs 13 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 8 IoCs
  • Hijack Execution Flow: Executable Installer File Permissions Weakness 1 TTPs 3 IoCs

    Possible Turn off User Account Control's privilege elevation for standard users.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3.exe
    "C:\Users\Admin\AppData\Local\Temp\c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\xencqtkmhox.exe
      "C:\Users\Admin\AppData\Local\Temp\xencqtkmhox.exe" "c:\users\admin\appdata\local\temp\c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Hijack Execution Flow: Executable Installer File Permissions Weakness
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1440
      • C:\Users\Admin\AppData\Local\Temp\iptcgt.exe
        "C:\Users\Admin\AppData\Local\Temp\iptcgt.exe" "-C:\Users\Admin\AppData\Local\Temp\ulzsgdsivigsgatb.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Impair Defenses: Safe Mode Boot
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:2840
      • C:\Users\Admin\AppData\Local\Temp\iptcgt.exe
        "C:\Users\Admin\AppData\Local\Temp\iptcgt.exe" "-C:\Users\Admin\AppData\Local\Temp\ulzsgdsivigsgatb.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Hijack Execution Flow: Executable Installer File Permissions Weakness
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2344
    • C:\Users\Admin\AppData\Local\Temp\xencqtkmhox.exe
      "C:\Users\Admin\AppData\Local\Temp\xencqtkmhox.exe" "c:\users\admin\appdata\local\temp\c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3.exe"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System policy modification
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\zzwyvbzyuqxspsulqghhe.djh

    Filesize

    280B

    MD5

    d063b34266706615b7e4c779cac8730b

    SHA1

    7126d3ba968e5f87b7804767e5264a264f4df591

    SHA256

    392c31a3111283b004d02b06517ef190d47e7fc6462c60195240667bffaefa68

    SHA512

    e1bdfa69a19f93e3f335ba16036dfa2dfd536b61da1f324a3df3dfd6e0610bfb36e091a0cb79fba66d9c1f8dbb059cb2d3e191143b0eb235a59862c6d5572aee

  • C:\Users\Admin\AppData\Local\Temp\iptcgt.exe

    Filesize

    704KB

    MD5

    9883767ace72245752d33a68710fbbef

    SHA1

    f59825b6e7effaf0a3c89c29dec94503361292a7

    SHA256

    303eee9504e214e450348d45dc4ce7d34afb44f4cbaabc9c95dba179396513fe

    SHA512

    bfc2ca0e8fed95c0deca8b7db9264453dc818895894c5cf516bf35ba27cc28b65bd8edcf0faec3bc3b2bd2f7931ecfbae695870a933b1d588820153bd97a0d69

  • C:\Users\Admin\AppData\Local\ufnaiziszgyemanpfgsdlygxgqxewcky.nde

    Filesize

    4KB

    MD5

    5d868e7c6771b0200f499206a5caa858

    SHA1

    c76788d1f69a342d762013b8b1b13ad77692f8a0

    SHA256

    065fe10e74cead51b41b6a32333877d6dce3f061bad31bf6a4d5cd9cd163a4f8

    SHA512

    f00209280a22faac435433046a050164683646aeccd58f7910fc3a25ac3df499cdf188efe92a1c9b29191295aaefcbbd4d2e5ecec1a2b1eb73d4bd63820f3995

  • C:\Users\Admin\AppData\Local\zzwyvbzyuqxspsulqghhe.djh

    Filesize

    280B

    MD5

    d5bb22d5852e78462d33f592503cb9fb

    SHA1

    57458f09d1aae2640669ba13f8cee45113d79e39

    SHA256

    724a15c067f3d0e680e8ce9bcab38b74d176ce62d4d57881567ef0c0747d2539

    SHA512

    09a08f06140eed97ba916eb63b0c7830e404982105e3b06bd4b410a10acf3c881450effc28c9fde879b20ce4222e3d1c753e828e9ebd999f57cd9186baed9fa0

  • C:\Users\Admin\AppData\Local\zzwyvbzyuqxspsulqghhe.djh

    Filesize

    280B

    MD5

    9a7f84e3deec9f7149f33895eadc48ce

    SHA1

    48dde9814c8cc284eda1d356b7eb3dcd1e16fc8c

    SHA256

    1467b201ace813e60a87480eee5cb538eac2e3303293fe60463b1c503336146f

    SHA512

    0663c0289bc44bf51f7c7a33b31e7281b809154949c781d33e20463ec5cec6f9bee502a70e4db7a1a6c77762d5b9e590471f0077f86c4bc89760fea619ab6a1f

  • C:\Users\Admin\AppData\Local\zzwyvbzyuqxspsulqghhe.djh

    Filesize

    280B

    MD5

    0a3aa76d8edbff2cf6ef056c1f8383bc

    SHA1

    ee8ab544b656e34aa4604fee5d67727b94cbec96

    SHA256

    b01e10c3457105b222839a0c5c3616e84a16b5b421733d8f95eef2043c3743cb

    SHA512

    99826ed61e4f5ffeca20c8c1937264531ef4978ea4c1d58a83d35e258a83b4da73ba7ba120fc230577ae937d63cf83a36c02b7a995133d424d334386ad5b31b7

  • C:\Users\Admin\AppData\Local\zzwyvbzyuqxspsulqghhe.djh

    Filesize

    280B

    MD5

    ee9f98bf5efd69e473696ce08d32e55b

    SHA1

    9c5db2017eab2bf73a748d897646d0084a16663e

    SHA256

    fa760d93a0caa890ed6cdc78e63c42044a7fed883f3ca6398545a6a181e81f6f

    SHA512

    e6a9e95a903ba5f7b5d2a6a2613032a0145894ee73c4ae7583161ae5d8ddf0e80ae0d30877daebfd8149ba9c3e75f3a8dbbc591248bf139a3fd8bed913e7f918

  • C:\Users\Admin\AppData\Local\zzwyvbzyuqxspsulqghhe.djh

    Filesize

    280B

    MD5

    c6fedf8bd67f905ebb6316465f0309e9

    SHA1

    011209c4f010ba6abfb20fc47a985d79846ffb51

    SHA256

    3d5787c9395dc1bc633e8744e03efb1d3c4b9d29350ddfbcb30dd3a79037870c

    SHA512

    b78b4914697ce7026e878bfef0d3a75a77f061218f7dbb3c19788e1d666938cb9ecec939b28653e6e1e0022e35634a2fef5f18b6f79aea1bc4e7f625930cc963

  • C:\Windows\SysWOW64\kdtoedumbqqeuqlvtc.exe

    Filesize

    608KB

    MD5

    11551100b5caf188919b0b123358f1bb

    SHA1

    dd26d0ec4c80274e984ac2553f9f0510f68c22c1

    SHA256

    c87c614987ce33454bb6469365cb3584335f2a67c9280e16a959783760f97aa3

    SHA512

    11ad8a53eab762da1766a0b2fd423d338b1e8de0c396b5c6fc10ccdeb5cde6e334598465844c969414ba37f02e01d19215263a9084a4ea0c465e53e91d798de2

  • \Users\Admin\AppData\Local\Temp\xencqtkmhox.exe

    Filesize

    320KB

    MD5

    ce36f74e023f26d58dabc6c55b879cce

    SHA1

    10da5b20490a65c294859d8c96e5be0ff70cf11d

    SHA256

    5301f423cabb9476b93cb183fd5dfa3f44ae0f8496d4925a6cd7c4a224fdb415

    SHA512

    a8c6aa9839327377ddd6b9df64993cb7aa9590ffa2e83d4b84d5c05a43bd47daa7ed8cea39bf562fe792bbf5071ef7a5ef605745579b78d9557677a039b63be7