Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07/07/2022, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
Booking Confirmation 1104202403251 - copy - PDF.exe
Resource
win7-20220414-en
General
-
Target
Booking Confirmation 1104202403251 - copy - PDF.exe
-
Size
344KB
-
MD5
f4f48519f108900933d0dd0e8aa1f40f
-
SHA1
5a48020b486ab74eea85cf88d647dc2ba0994ace
-
SHA256
f6d2fe1a8ba40429708ec5c70159fcff0e9741ea260ea93e3665d6ea752f96d3
-
SHA512
d02dc186871c344bddac7ae1a5c1e9c72014e106dfdbe1c565bf7a56ae052b10f7abb69f34010f5315752766bc40a86d1f9e20da2c8c70f7c0aef053ab3248a1
Malware Config
Signatures
-
HiveRAT Payload 10 IoCs
resource yara_rule behavioral2/memory/4488-151-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-153-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-157-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-158-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-159-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-155-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-163-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-166-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-167-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4488-168-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe Booking Confirmation 1104202403251 - copy - PDF.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3344 set thread context of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 -
Delays execution with timeout.exe 1 IoCs
pid Process 1660 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
pid Process 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 2348 powershell.exe 2348 powershell.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 3344 Booking Confirmation 1104202403251 - copy - PDF.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 WScript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4980 Booking Confirmation 1104202403251 - copy - PDF.exe Token: SeDebugPrivilege 2348 powershell.exe Token: SeDebugPrivilege 3344 Booking Confirmation 1104202403251 - copy - PDF.exe Token: SeDebugPrivilege 4488 Booking Confirmation 1104202403251 - copy - PDF.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4980 wrote to memory of 1012 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 80 PID 4980 wrote to memory of 1012 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 80 PID 4980 wrote to memory of 1012 4980 Booking Confirmation 1104202403251 - copy - PDF.exe 80 PID 1012 wrote to memory of 1660 1012 cmd.exe 82 PID 1012 wrote to memory of 1660 1012 cmd.exe 82 PID 1012 wrote to memory of 1660 1012 cmd.exe 82 PID 1012 wrote to memory of 2348 1012 cmd.exe 83 PID 1012 wrote to memory of 2348 1012 cmd.exe 83 PID 1012 wrote to memory of 2348 1012 cmd.exe 83 PID 2348 wrote to memory of 2924 2348 powershell.exe 84 PID 2348 wrote to memory of 2924 2348 powershell.exe 84 PID 2348 wrote to memory of 2924 2348 powershell.exe 84 PID 2348 wrote to memory of 3344 2348 powershell.exe 85 PID 2348 wrote to memory of 3344 2348 powershell.exe 85 PID 2348 wrote to memory of 3344 2348 powershell.exe 85 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86 PID 3344 wrote to memory of 4488 3344 Booking Confirmation 1104202403251 - copy - PDF.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Booking Confirmation 1104202403251 - copy - PDF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Confirmation 1104202403251 - copy - PDF.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 5 & powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\129579.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:1660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\129579.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe'3⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\129579.js"4⤵
- Suspicious behavior: RenamesItself
PID:2924
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"4⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Booking Confirmation 1104202403251 - copy - PDF.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD59319c8e299915f15f09346cd84c43b13
SHA17fc0374c1887ebc81d31b70d81fcdcb0251cd640
SHA2561a90dcfd32487e44228f5960d10b5026f5ab5dd469faef9ae4a3a921007a75ea
SHA5123847beafe59ed9707ba7458daf882ebbebb6b5d45ef359636f81fe56cd80cb9a20290997831d336b3abe1f16d5677decb57b9d6bb3c0c83b1f828b08e6b8a29b