Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
55s -
platform
windows7_x64 -
resource
win7 -
submitted
09/07/2020, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
KSP QUOTE_2.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
KSP QUOTE_2.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
KSP QUOTE_2.exe
-
Size
527KB
-
MD5
187a269d103856e0d922e71e26046ac4
-
SHA1
3b9c201ceff06148739d6c59e3a20c2048e8a9fe
-
SHA256
48ce0e9cc96cb8d9ebe92bd7c1982e84d48baffdbada44d5949370a58ebae901
-
SHA512
9bedef76d5de703b32123c130aa27f0efd5850e395c2601ab030162872b5c06f68e1439282d9cef9a7133416ee23ed657f2da8f3d9e39ab5db39ad6c8c1ad66b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 240 wrote to memory of 844 240 KSP QUOTE_2.exe 24 PID 240 wrote to memory of 844 240 KSP QUOTE_2.exe 24 PID 240 wrote to memory of 844 240 KSP QUOTE_2.exe 24 PID 240 wrote to memory of 844 240 KSP QUOTE_2.exe 24 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 240 wrote to memory of 1532 240 KSP QUOTE_2.exe 26 PID 1532 wrote to memory of 1764 1532 KSP QUOTE_2.exe 27 PID 1532 wrote to memory of 1764 1532 KSP QUOTE_2.exe 27 PID 1532 wrote to memory of 1764 1532 KSP QUOTE_2.exe 27 PID 1532 wrote to memory of 1764 1532 KSP QUOTE_2.exe 27 PID 1764 wrote to memory of 1396 1764 colorcpl.exe 28 PID 1764 wrote to memory of 1396 1764 colorcpl.exe 28 PID 1764 wrote to memory of 1396 1764 colorcpl.exe 28 PID 1764 wrote to memory of 1396 1764 colorcpl.exe 28 -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 240 set thread context of 1532 240 KSP QUOTE_2.exe 26 PID 1532 set thread context of 1208 1532 KSP QUOTE_2.exe 20 PID 1532 set thread context of 1208 1532 KSP QUOTE_2.exe 20 PID 1764 set thread context of 1208 1764 colorcpl.exe 20 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1532 KSP QUOTE_2.exe 1532 KSP QUOTE_2.exe 1532 KSP QUOTE_2.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1532 KSP QUOTE_2.exe 1532 KSP QUOTE_2.exe 1532 KSP QUOTE_2.exe 1532 KSP QUOTE_2.exe 1764 colorcpl.exe 1764 colorcpl.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1532 KSP QUOTE_2.exe Token: SeDebugPrivilege 1764 colorcpl.exe -
Deletes itself 1 IoCs
pid Process 1396 cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 844 schtasks.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\KSP QUOTE_2.exe"C:\Users\Admin\AppData\Local\Temp\KSP QUOTE_2.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:240 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OraVYaLSUiRqmq" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA13D.tmp"3⤵
- Creates scheduled task(s)
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\KSP QUOTE_2.exe"{path}"3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"4⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\KSP QUOTE_2.exe"5⤵
- Deletes itself
PID:1396
-
-
-
-