Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07/07/2020, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
WRONG PAYMENT_PDF.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
WRONG PAYMENT_PDF.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
WRONG PAYMENT_PDF.exe
-
Size
370KB
-
MD5
23bdd421e22c233b48e0bf179ec45238
-
SHA1
7788999310396fb6617b51d55fa7f268bdf79fa8
-
SHA256
172842029f8937753e79843e36fcb4715c0f3a9de4b256585847df48caf8e10f
-
SHA512
4bca39de0d75405fbdc8c1a6ed4980b678ff66cd580c44d929d1595a9d8e3f5405ed696862edfb95f823905d3d245d4e360abf3eec2ef41539175d9f51145df0
Score
10/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1296 WRONG PAYMENT_PDF.exe Token: SeDebugPrivilege 1696 WRONG PAYMENT_PDF.exe Token: SeDebugPrivilege 1808 cmstp.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1296 wrote to memory of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1304 wrote to memory of 1808 1304 Explorer.EXE 27 PID 1808 wrote to memory of 1828 1808 cmstp.exe 28 PID 1808 wrote to memory of 1828 1808 cmstp.exe 28 PID 1808 wrote to memory of 1828 1808 cmstp.exe 28 PID 1808 wrote to memory of 1828 1808 cmstp.exe 28 PID 1808 wrote to memory of 1636 1808 cmstp.exe 31 PID 1808 wrote to memory of 1636 1808 cmstp.exe 31 PID 1808 wrote to memory of 1636 1808 cmstp.exe 31 PID 1808 wrote to memory of 1636 1808 cmstp.exe 31 PID 1808 wrote to memory of 1636 1808 cmstp.exe 31 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1296 set thread context of 1696 1296 WRONG PAYMENT_PDF.exe 26 PID 1696 set thread context of 1304 1696 WRONG PAYMENT_PDF.exe 20 PID 1808 set thread context of 1304 1808 cmstp.exe 20 -
Executes dropped EXE 1 IoCs
pid Process 1696 WRONG PAYMENT_PDF.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1296 WRONG PAYMENT_PDF.exe 1696 WRONG PAYMENT_PDF.exe 1696 WRONG PAYMENT_PDF.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1696 WRONG PAYMENT_PDF.exe 1696 WRONG PAYMENT_PDF.exe 1696 WRONG PAYMENT_PDF.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe 1808 cmstp.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cmstp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JPWDVVHPJD = "C:\\Program Files (x86)\\Bolxdwh\\Cookies1bd0.exe" cmstp.exe -
Loads dropped DLL 1 IoCs
pid Process 1296 WRONG PAYMENT_PDF.exe -
description ioc Process Key created \Registry\User\S-1-5-21-910373003-3952921535-3480519689-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bolxdwh\Cookies1bd0.exe cmstp.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
- Suspicious use of FindShellTrayWindow
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\WRONG PAYMENT_PDF.exe"C:\Users\Admin\AppData\Local\Temp\WRONG PAYMENT_PDF.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\WRONG PAYMENT_PDF.exe"C:\Users\Admin\AppData\Local\Temp\WRONG PAYMENT_PDF.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1696
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Drops file in Program Files directory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\WRONG PAYMENT_PDF.exe"3⤵PID:1828
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1636
-
-