Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10_x64 -
resource
win10 -
submitted
15/07/2020, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
MT103 PAYMENT COPY_PDF.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MT103 PAYMENT COPY_PDF.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
MT103 PAYMENT COPY_PDF.exe
-
Size
369KB
-
MD5
20a2543a7a37a75b93924dd83c03743d
-
SHA1
dacf53a9ae5c29a1d33fb2bf064ede984a0ad379
-
SHA256
8c55df1fdc1ac49e2c0a3b5b77bd044d842d2f6e38bd5f782d93853a560140fb
-
SHA512
3c49d4b09b5510e9a2ea24e75c9bf694a006cd31b9d06546aa08ac369cb8464916c40c7d0db566ef82d4b147e265582f5d081c26f3b6ad9e99f6c792c9be0d10
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4016 MT103 PAYMENT COPY_PDF.exe 4016 MT103 PAYMENT COPY_PDF.exe 4016 MT103 PAYMENT COPY_PDF.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer raserver.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 raserver.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Executes dropped EXE 1 IoCs
pid Process 4016 MT103 PAYMENT COPY_PDF.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Zwbu\-zfmxtpqlux.exe raserver.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run raserver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ZNCDKZIXI = "C:\\Program Files (x86)\\Zwbu\\-zfmxtpqlux.exe" raserver.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3544 MT103 PAYMENT COPY_PDF.exe Token: SeDebugPrivilege 4016 MT103 PAYMENT COPY_PDF.exe Token: SeDebugPrivilege 3812 raserver.exe Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE Token: SeShutdownPrivilege 2972 Explorer.EXE Token: SeCreatePagefilePrivilege 2972 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 69 IoCs
pid Process 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 3544 MT103 PAYMENT COPY_PDF.exe 4016 MT103 PAYMENT COPY_PDF.exe 4016 MT103 PAYMENT COPY_PDF.exe 4016 MT103 PAYMENT COPY_PDF.exe 4016 MT103 PAYMENT COPY_PDF.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe 3812 raserver.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 3544 wrote to memory of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 2972 wrote to memory of 3812 2972 Explorer.EXE 68 PID 2972 wrote to memory of 3812 2972 Explorer.EXE 68 PID 2972 wrote to memory of 3812 2972 Explorer.EXE 68 PID 3812 wrote to memory of 3796 3812 raserver.exe 69 PID 3812 wrote to memory of 3796 3812 raserver.exe 69 PID 3812 wrote to memory of 3796 3812 raserver.exe 69 PID 3812 wrote to memory of 3704 3812 raserver.exe 77 PID 3812 wrote to memory of 3704 3812 raserver.exe 77 PID 3812 wrote to memory of 3704 3812 raserver.exe 77 PID 3812 wrote to memory of 1028 3812 raserver.exe 79 PID 3812 wrote to memory of 1028 3812 raserver.exe 79 PID 3812 wrote to memory of 1028 3812 raserver.exe 79 -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3544 set thread context of 4016 3544 MT103 PAYMENT COPY_PDF.exe 67 PID 4016 set thread context of 2972 4016 MT103 PAYMENT COPY_PDF.exe 56 PID 3812 set thread context of 2972 3812 raserver.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:4016
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious behavior: MapViewOfSection
- System policy modification
- Modifies Internet Explorer settings
- Drops file in Program Files directory
- Adds policy Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3812 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MT103 PAYMENT COPY_PDF.exe"3⤵PID:3796
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:3704
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1028
-
-