Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13/07/2020, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
Attached is the new order, mecano group.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Attached is the new order, mecano group.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Attached is the new order, mecano group.exe
-
Size
1.1MB
-
MD5
727396a68b9b5cbf700d7b948db6d830
-
SHA1
bd50594103f8554d8e076f0cc3a5a65c95586bee
-
SHA256
ca1d053d41842ab4052e83f395cfef43d3b79f16a5c437fbfcc10fef27c97ca8
-
SHA512
a1a1129d9630a3731daaf22bf67baa655bf8026da116e69d008641e9697dbaab9ac78a6a2c5acdeb733df64c8a343c88ef822adf07ace41cf95fbb64d8c0f3df
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1812 ieinstal.exe 1812 ieinstal.exe 1812 ieinstal.exe 1812 ieinstal.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1812 ieinstal.exe Token: SeDebugPrivilege 2392 msdt.exe Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE Token: SeShutdownPrivilege 2984 Explorer.EXE Token: SeCreatePagefilePrivilege 2984 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1812 ieinstal.exe 1812 ieinstal.exe 1812 ieinstal.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe 2392 msdt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1812 set thread context of 2984 1812 ieinstal.exe 56 PID 2392 set thread context of 2984 2392 msdt.exe 56 -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run msdt.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe 69 PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe 69 PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe 69 PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe 69 PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe 69 PID 664 wrote to memory of 1812 664 Attached is the new order, mecano group.exe 69 PID 2984 wrote to memory of 2392 2984 Explorer.EXE 72 PID 2984 wrote to memory of 2392 2984 Explorer.EXE 72 PID 2984 wrote to memory of 2392 2984 Explorer.EXE 72 PID 2392 wrote to memory of 2784 2392 msdt.exe 73 PID 2392 wrote to memory of 2784 2392 msdt.exe 73 PID 2392 wrote to memory of 2784 2392 msdt.exe 73 PID 2392 wrote to memory of 3000 2392 msdt.exe 76 PID 2392 wrote to memory of 3000 2392 msdt.exe 76 PID 2392 wrote to memory of 3000 2392 msdt.exe 76 -
Adds Run entry to policy start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\YNVHZLYXCNY = "C:\\Program Files (x86)\\internet explorer\\ieinstal.exe" msdt.exe Key created \Registry\User\S-1-5-21-1231583446-2617009595-2137880041-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msdt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"C:\Users\Admin\AppData\Local\Temp\Attached is the new order, mecano group.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1812
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Adds Run entry to start application
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Adds Run entry to policy start application
PID:2392 -
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:2784
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3000
-
-