Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
116s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
Pfz2O0m5k-july2020-RFQ.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Pfz2O0m5k-july2020-RFQ.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Pfz2O0m5k-july2020-RFQ.exe
-
Size
395KB
-
MD5
b6076c3f3c090e88a79b3ab2398cb2a5
-
SHA1
a88f5b2d7f7c9c9c1f015ed7c659656fa752df02
-
SHA256
1520c196804649d5a465a2003046210148f70d50e926366300214cea9ef15719
-
SHA512
195b4e1ee8a7239d5d46cda19b43f17175ce1d7c25889d0a7152d4501c37f917baee8c9c27c91585eed139b42320d1fe0e5999166d47166fb01ae37025267a5b
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1040 Pfz2O0m5k-july2020-RFQ.exe 1040 Pfz2O0m5k-july2020-RFQ.exe 1040 Pfz2O0m5k-july2020-RFQ.exe 1040 Pfz2O0m5k-july2020-RFQ.exe 1504 systray.exe 1504 systray.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1584 wrote to memory of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1276 wrote to memory of 1504 1276 Explorer.EXE 25 PID 1276 wrote to memory of 1504 1276 Explorer.EXE 25 PID 1276 wrote to memory of 1504 1276 Explorer.EXE 25 PID 1276 wrote to memory of 1504 1276 Explorer.EXE 25 PID 1504 wrote to memory of 1368 1504 systray.exe 26 PID 1504 wrote to memory of 1368 1504 systray.exe 26 PID 1504 wrote to memory of 1368 1504 systray.exe 26 PID 1504 wrote to memory of 1368 1504 systray.exe 26 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1040 Pfz2O0m5k-july2020-RFQ.exe 1040 Pfz2O0m5k-july2020-RFQ.exe 1040 Pfz2O0m5k-july2020-RFQ.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe 1504 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 Pfz2O0m5k-july2020-RFQ.exe Token: SeDebugPrivilege 1504 systray.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1584 set thread context of 1040 1584 Pfz2O0m5k-july2020-RFQ.exe 24 PID 1040 set thread context of 1276 1040 Pfz2O0m5k-july2020-RFQ.exe 20 PID 1040 set thread context of 1276 1040 Pfz2O0m5k-july2020-RFQ.exe 20 PID 1504 set thread context of 1276 1504 systray.exe 20 -
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Pfz2O0m5k-july2020-RFQ.exe"C:\Users\Admin\AppData\Local\Temp\Pfz2O0m5k-july2020-RFQ.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Pfz2O0m5k-july2020-RFQ.exe"{path}"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
PID:1040
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
PID:1504 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Pfz2O0m5k-july2020-RFQ.exe"3⤵
- Deletes itself
PID:1368
-
-