Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows7_x64 -
resource
win7 -
submitted
15/07/2020, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
MT103 PAYMENT COPY_PDF.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MT103 PAYMENT COPY_PDF.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
MT103 PAYMENT COPY_PDF.exe
-
Size
369KB
-
MD5
20a2543a7a37a75b93924dd83c03743d
-
SHA1
dacf53a9ae5c29a1d33fb2bf064ede984a0ad379
-
SHA256
8c55df1fdc1ac49e2c0a3b5b77bd044d842d2f6e38bd5f782d93853a560140fb
-
SHA512
3c49d4b09b5510e9a2ea24e75c9bf694a006cd31b9d06546aa08ac369cb8464916c40c7d0db566ef82d4b147e265582f5d081c26f3b6ad9e99f6c792c9be0d10
Score
8/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1516 MT103 PAYMENT COPY_PDF.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cmstp.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cmstp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\YJRPUFWH5L = "C:\\Program Files (x86)\\Mgzvh\\IconCachewnd0n4.exe" cmstp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1516 MT103 PAYMENT COPY_PDF.exe Token: SeDebugPrivilege 1752 MT103 PAYMENT COPY_PDF.exe Token: SeDebugPrivilege 1936 cmstp.exe Token: SeShutdownPrivilege 1212 Explorer.EXE -
Executes dropped EXE 1 IoCs
pid Process 1752 MT103 PAYMENT COPY_PDF.exe -
description ioc Process Key created \Registry\User\S-1-5-21-1131729243-447456001-3632642222-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmstp.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mgzvh\IconCachewnd0n4.exe cmstp.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1516 MT103 PAYMENT COPY_PDF.exe 1752 MT103 PAYMENT COPY_PDF.exe 1752 MT103 PAYMENT COPY_PDF.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1516 set thread context of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1752 set thread context of 1212 1752 MT103 PAYMENT COPY_PDF.exe 20 PID 1936 set thread context of 1212 1936 cmstp.exe 20 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1516 wrote to memory of 1752 1516 MT103 PAYMENT COPY_PDF.exe 24 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1212 wrote to memory of 1936 1212 Explorer.EXE 35 PID 1936 wrote to memory of 1952 1936 cmstp.exe 36 PID 1936 wrote to memory of 1952 1936 cmstp.exe 36 PID 1936 wrote to memory of 1952 1936 cmstp.exe 36 PID 1936 wrote to memory of 1952 1936 cmstp.exe 36 PID 1936 wrote to memory of 1020 1936 cmstp.exe 41 PID 1936 wrote to memory of 1020 1936 cmstp.exe 41 PID 1936 wrote to memory of 1020 1936 cmstp.exe 41 PID 1936 wrote to memory of 1020 1936 cmstp.exe 41 PID 1936 wrote to memory of 1020 1936 cmstp.exe 41 -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1752 MT103 PAYMENT COPY_PDF.exe 1752 MT103 PAYMENT COPY_PDF.exe 1752 MT103 PAYMENT COPY_PDF.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe 1936 cmstp.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1752
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1872
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1864
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1888
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1880
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1896
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1912
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1908
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1928
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1920
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1944
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- System policy modification
- Adds policy Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Modifies Internet Explorer settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1936 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"3⤵PID:1952
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1020
-
-