Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
NEW_PURC.EXE
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
NEW_PURC.EXE
Resource
win10
0 signatures
0 seconds
General
-
Target
NEW_PURC.EXE
-
Size
403KB
-
MD5
b5b940f3a5c44f7c568f55e711bd4e22
-
SHA1
4b81fd2ae56891dd623dd18bdb1bac1627f720da
-
SHA256
53a076f12f6d31f5d0ddbb7a9c061dfd29516342b0102504f60341e363636eb8
-
SHA512
ee4c712e7448c73e78880a20637feb4f39365e5b57faae981802ed5a878811e973becc6626a6ae18784d646a8049fff17498f29c0a5d971e6b524e3f2fec1e72
Score
7/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1816 1304 NEW_PURC.EXE 26 PID 1304 wrote to memory of 1816 1304 NEW_PURC.EXE 26 PID 1304 wrote to memory of 1816 1304 NEW_PURC.EXE 26 PID 1304 wrote to memory of 1816 1304 NEW_PURC.EXE 26 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 PID 1304 wrote to memory of 1764 1304 NEW_PURC.EXE 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1304 set thread context of 1764 1304 NEW_PURC.EXE 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1304 NEW_PURC.EXE -
Loads dropped DLL 6 IoCs
pid Process 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe 1764 RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1816 schtasks.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW_PURC.EXE"C:\Users\Admin\AppData\Local\Temp\NEW_PURC.EXE"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RnFcWDUAarOZB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA7E2.tmp"2⤵
- Creates scheduled task(s)
PID:1816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Loads dropped DLL
PID:1764
-