Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
payment invoice.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
payment invoice.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
payment invoice.exe
-
Size
179KB
-
MD5
3b2135422ad7974f674d9e3afffa04e7
-
SHA1
e8a7ab8aea4ba52a5af377e4e77c983d9be2db7a
-
SHA256
a361c3ef57783d4012857a289d088c19682187bb0b6f15eabb73865d1d54e180
-
SHA512
c708e169d34d54fa0fb104d553b967c7748ab31602c622c96f880916af36d53a493e6aeef55b9e6aa0e4450487b1089c85af037fb6fb9af73936e05931f2e3c6
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 616 payment invoice.exe 616 payment invoice.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 616 set thread context of 1264 616 payment invoice.exe 20 PID 1260 set thread context of 1264 1260 chkdsk.exe 20 -
Deletes itself 1 IoCs
pid Process 1428 cmd.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 616 payment invoice.exe 616 payment invoice.exe 616 payment invoice.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe 1260 chkdsk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Tnpwdbb\winqzp.exe chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 616 payment invoice.exe Token: SeDebugPrivilege 1260 chkdsk.exe Token: SeShutdownPrivilege 1264 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1260 1264 Explorer.EXE 24 PID 1264 wrote to memory of 1260 1264 Explorer.EXE 24 PID 1264 wrote to memory of 1260 1264 Explorer.EXE 24 PID 1264 wrote to memory of 1260 1264 Explorer.EXE 24 PID 1260 wrote to memory of 1428 1260 chkdsk.exe 25 PID 1260 wrote to memory of 1428 1260 chkdsk.exe 25 PID 1260 wrote to memory of 1428 1260 chkdsk.exe 25 PID 1260 wrote to memory of 1428 1260 chkdsk.exe 25 PID 1260 wrote to memory of 1512 1260 chkdsk.exe 28 PID 1260 wrote to memory of 1512 1260 chkdsk.exe 28 PID 1260 wrote to memory of 1512 1260 chkdsk.exe 28 PID 1260 wrote to memory of 1512 1260 chkdsk.exe 28 PID 1260 wrote to memory of 1512 1260 chkdsk.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer chkdsk.exe -
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\XX4TNFW8_FC = "C:\\Program Files (x86)\\Tnpwdbb\\winqzp.exe" chkdsk.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\payment invoice.exe"C:\Users\Admin\AppData\Local\Temp\payment invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
- Adds Run entry to policy start application
PID:1260 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\payment invoice.exe"3⤵
- Deletes itself
PID:1428
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1512
-
-