Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7 -
submitted
13/07/2020, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
Attached is the new order, mecano group.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Attached is the new order, mecano group.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Attached is the new order, mecano group.exe
-
Size
1.1MB
-
MD5
727396a68b9b5cbf700d7b948db6d830
-
SHA1
bd50594103f8554d8e076f0cc3a5a65c95586bee
-
SHA256
ca1d053d41842ab4052e83f395cfef43d3b79f16a5c437fbfcc10fef27c97ca8
-
SHA512
a1a1129d9630a3731daaf22bf67baa655bf8026da116e69d008641e9697dbaab9ac78a6a2c5acdeb733df64c8a343c88ef822adf07ace41cf95fbb64d8c0f3df
Score
8/10
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Script User-Agent 2 IoCs
description flow ioc HTTP User-Agent header 4 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 6 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Adds Run entry to policy start application 2 TTPs 1 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run rundll32.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1440 ieinstal.exe 1440 ieinstal.exe 1440 ieinstal.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1440 set thread context of 1264 1440 ieinstal.exe 20 PID 1440 set thread context of 1264 1440 ieinstal.exe 20 PID 912 set thread context of 1264 912 rundll32.exe 20 -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 rundll32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1440 ieinstal.exe 1440 ieinstal.exe 1440 ieinstal.exe 1440 ieinstal.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1440 ieinstal.exe Token: SeDebugPrivilege 912 rundll32.exe Token: SeShutdownPrivilege 1264 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Adds Run entry to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\K62XCZYPTH_ = "C:\\Program Files (x86)\\internet explorer\\ieinstal.exe" rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1132 wrote to memory of 1440 1132 Attached is the new order, mecano group.exe 24 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 1264 wrote to memory of 912 1264 Explorer.EXE 25 PID 912 wrote to memory of 1496 912 rundll32.exe 27 PID 912 wrote to memory of 1496 912 rundll32.exe 27 PID 912 wrote to memory of 1496 912 rundll32.exe 27 PID 912 wrote to memory of 1496 912 rundll32.exe 27 PID 912 wrote to memory of 1496 912 rundll32.exe 27
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Adds Run entry to policy start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1496
-
-