Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
Purchase_Order.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Purchase_Order.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
Purchase_Order.exe
-
Size
638KB
-
MD5
6a2a8086b34fbd0dfe9dd3dc433d77d6
-
SHA1
d2b6c5b889844e685c64322c11d86b22a005b165
-
SHA256
8f60548d2cde9e0681d8609aef71f51c820073a2a70e75bfa0fa56e3890d94e0
-
SHA512
b84db37efc9d329d17b893effa14188be4b244e0e1451a04623faeb0bb592f7b60fcefbc7bf483b0651202262dde532ae3f72e8fb809aff733fe346767aa6a7e
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1812 3100 Purchase_Order.exe 67 PID 3100 wrote to memory of 1812 3100 Purchase_Order.exe 67 PID 3100 wrote to memory of 1812 3100 Purchase_Order.exe 67 PID 1812 wrote to memory of 1868 1812 avd.exe 70 PID 1812 wrote to memory of 1868 1812 avd.exe 70 PID 1868 wrote to memory of 1484 1868 cmd.exe 71 PID 1868 wrote to memory of 1484 1868 cmd.exe 71 PID 3100 wrote to memory of 776 3100 Purchase_Order.exe 72 PID 3100 wrote to memory of 776 3100 Purchase_Order.exe 72 PID 3100 wrote to memory of 776 3100 Purchase_Order.exe 72 PID 3100 wrote to memory of 2064 3100 Purchase_Order.exe 74 PID 3100 wrote to memory of 2064 3100 Purchase_Order.exe 74 PID 3100 wrote to memory of 2064 3100 Purchase_Order.exe 74 PID 2064 wrote to memory of 3012 2064 svchosts.sfx.exe 75 PID 2064 wrote to memory of 3012 2064 svchosts.sfx.exe 75 PID 2064 wrote to memory of 3012 2064 svchosts.sfx.exe 75 PID 3020 wrote to memory of 3520 3020 Explorer.EXE 76 PID 3020 wrote to memory of 3520 3020 Explorer.EXE 76 PID 3020 wrote to memory of 3520 3020 Explorer.EXE 76 PID 3520 wrote to memory of 2328 3520 wlanext.exe 77 PID 3520 wrote to memory of 2328 3520 wlanext.exe 77 PID 3520 wrote to memory of 2328 3520 wlanext.exe 77 PID 3520 wrote to memory of 852 3520 wlanext.exe 79 PID 3520 wrote to memory of 852 3520 wlanext.exe 79 PID 3520 wrote to memory of 852 3520 wlanext.exe 79 PID 3520 wrote to memory of 1044 3520 wlanext.exe 81 PID 3520 wrote to memory of 1044 3520 wlanext.exe 81 PID 3520 wrote to memory of 1044 3520 wlanext.exe 81 -
Executes dropped EXE 3 IoCs
pid Process 1812 avd.exe 2064 svchosts.sfx.exe 3012 svchosts.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1812 avd.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3012 svchosts.exe 3012 svchosts.exe 3012 svchosts.exe 3012 svchosts.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 3012 svchosts.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeDebugPrivilege 3520 wlanext.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3012 svchosts.exe 3012 svchosts.exe 3012 svchosts.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe 3520 wlanext.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3012 set thread context of 3020 3012 svchosts.exe 56 PID 3520 set thread context of 3020 3520 wlanext.exe 56 -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3020 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Purchase_Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase_Order.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\avd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\avd.exe"3⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E60A.tmp\E60B.tmp\E60C.bat C:\Users\Admin\AppData\Local\Temp\RarSFX0\avd.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t "REG_DWORD" /d "1" /f5⤵PID:1484
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\op.bat" "3⤵PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchosts.sfx.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\svchosts.sfx.exe"3⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\svchosts.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\svchosts.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:3012
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:3520 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\svchosts.exe"3⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:852
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1044
-
-