Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 18:27

General

  • Target

    82e371fd28959c3b08f8de9eba4b64f13f5497a0baa8555c5cbb21a058d59516N.exe

  • Size

    512KB

  • MD5

    9be0ba7b2e2ada8bf29f8460c451b1b0

  • SHA1

    763f4c9651b6b14b9c4e0763971aacc7b0ca7335

  • SHA256

    82e371fd28959c3b08f8de9eba4b64f13f5497a0baa8555c5cbb21a058d59516

  • SHA512

    10e9dcd5025e536133c8866eb331a29c2639463f0cce281bcbb7303672398122e33c3b7dcbaa3dd96a41f798fcb13026b915cbdae26e36d02ef629b29b4b6e4a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82e371fd28959c3b08f8de9eba4b64f13f5497a0baa8555c5cbb21a058d59516N.exe
    "C:\Users\Admin\AppData\Local\Temp\82e371fd28959c3b08f8de9eba4b64f13f5497a0baa8555c5cbb21a058d59516N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\xknqivoptj.exe
      xknqivoptj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\gwuzrhea.exe
        C:\Windows\system32\gwuzrhea.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2888
    • C:\Windows\SysWOW64\cynjtfhqwfpndvv.exe
      cynjtfhqwfpndvv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2056
    • C:\Windows\SysWOW64\gwuzrhea.exe
      gwuzrhea.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1784
    • C:\Windows\SysWOW64\frkpdcczxfvqm.exe
      frkpdcczxfvqm.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2776
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      77ec3c9b5d401b46d40d94b441e34354

      SHA1

      036a9fe7c8b04f02181b0d0184aa0e4f2e053366

      SHA256

      11f862a905c17df11310573ee521b5ff893d67fdbb87883bf46ec6dfdcfeadbf

      SHA512

      39594a4e2229eb095886134eb924a8cf724f966ed261130cc1331dfe46bd1cb96ead6e14e452c67e2b63a0a5b9a55202c437ccbb2ef47d2bb004f1863d2bc692

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      d902263fdbf2137cd649d61185d53027

      SHA1

      74a3370dea2a1853f03ade060f7fa8d514495c8f

      SHA256

      3eb5442f229cc14d9fdf9390738059f1312953834c1694a24df5e51e8e612e6d

      SHA512

      053209d52d123f96691b7a0c39c49ea21f4a6c45fe5f6908b38a36411244fb4c19effd1bce8273d8866cc276368a4503396fc470d4d1896eb7697cd8f44c5982

    • C:\Users\Admin\Music\ResumeInvoke.doc.exe

      Filesize

      512KB

      MD5

      51c518c024fa49d67f918778a912e447

      SHA1

      2d419de89ca15b0519fee1b2d77fbe09c1cc89ed

      SHA256

      2c1dccce6e8c84be60ac2f889f51cf1f863db7d02aecd6b9e82352e85ded0b21

      SHA512

      44297e8735531e833b66b818b15761a4c1b7356bff0fe9d620152756ee5ed1281fe165eec71495482e5ae957fbe02ccd44fba66ae9763e080797d8d53b6f12e4

    • C:\Windows\SysWOW64\cynjtfhqwfpndvv.exe

      Filesize

      512KB

      MD5

      6caba7f38184149f51d5c7a3634f2408

      SHA1

      d3f5566d1585557d49012e1e26c56e77ec459d86

      SHA256

      9e1b6a8161c8ceed22896a5722f351270f9c7ee874cdce8fbfd653863b0bc6d5

      SHA512

      e99b867476c9d6088ba558d5e55d30bea34f6d0adf5d1c67e44d5d10b1bb3e7200919ca0614ad78580edef7d218f37e24a0115002d3d24b52cca8a83ce37a6a3

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\frkpdcczxfvqm.exe

      Filesize

      512KB

      MD5

      db412dac63813ec1198c80eec1d9e068

      SHA1

      a284b44f5ad9a05525990e8d904c981b16097d0c

      SHA256

      0a18999bb070b21806a295bd909d6f7f9a4c16502ce1886e867ede9cb91c1792

      SHA512

      0780357c83969ed78b9ba860ddcae29c3192502bf4f351d511439ceac1101c4be117e56639b89a3a37099799d6dc37fe1480a0a239eea676fa3f890b2738ac9f

    • \Windows\SysWOW64\gwuzrhea.exe

      Filesize

      512KB

      MD5

      9e962e70b7f7fe9436552e5aec993b06

      SHA1

      0ff91b27a59c2cc366263f0700fc058a7be0efcc

      SHA256

      f8fa95a7e3eaf592482827197d96170ac7a7be9175f89277e7e0ba667c9ff470

      SHA512

      294d2b7a80be75fffb6417f85e4be0fec75c3a3deebf45fe44eb872fe4cbea77761044450043a472be19627f36efc5bf20379e5e7e29064a5d0c0bf6ec379d1d

    • \Windows\SysWOW64\xknqivoptj.exe

      Filesize

      512KB

      MD5

      20bd33ee67ae75ab29f8bc3580379c68

      SHA1

      9479f03f3544876c25390ae78ee4b57342e03fe2

      SHA256

      b640fc87df2a5616b5eb7a00aeb609c69e410ef5849eafd60a0e848bd9395371

      SHA512

      c9471da9568bde724775213e30ec372597acc9298433401b5b044a95d9342de2e0a5219f64a75c2cf144901f1db62923ccb0baf08ff431884db39e00f867bce1

    • memory/1928-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2604-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB