Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
111s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21/05/2022, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Invoice.exe
Resource
win10v2004-20220414-en
General
-
Target
Invoice.exe
-
Size
818KB
-
MD5
922902037e92ce7c5297054a629f1ef5
-
SHA1
59ca48a0edf12bd54e7a7e956e3ded80f75cada5
-
SHA256
37eb096457c5f3b81945f57de1b46674cdd7ccf83714f0bc4c0d982ade2405bd
-
SHA512
ec101fb291b663b9916b9d056e0f10564e12d44c747cd3b5e2f1b93bce07073a0deb1b9e1c041c549d4381a254c2db9c72ce50258fec82e4dfd23faa159ab80e
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3304 set thread context of 4092 3304 Invoice.exe 81 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3304 Invoice.exe 3304 Invoice.exe 3304 Invoice.exe 4912 powershell.exe 4912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3304 Invoice.exe Token: SeDebugPrivilege 4912 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 3304 wrote to memory of 4092 3304 Invoice.exe 81 PID 4092 wrote to memory of 5084 4092 Invoice.exe 88 PID 4092 wrote to memory of 5084 4092 Invoice.exe 88 PID 4092 wrote to memory of 5084 4092 Invoice.exe 88 PID 5084 wrote to memory of 4912 5084 cmd.exe 90 PID 5084 wrote to memory of 4912 5084 cmd.exe 90 PID 5084 wrote to memory of 4912 5084 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"C:\Users\Admin\AppData\Local\Temp\Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\Invoice.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Invoice.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Invoice.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3