Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe
Resource
win7-20220812-en
General
-
Target
DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe
-
Size
461KB
-
MD5
26860d51fddf664076d1cf601e43ba1d
-
SHA1
dcd3fa1f67c3a7496caebd09c40cf8c6e5846c53
-
SHA256
7a73079ae74c6c75f4f72bdae2437960533e8532a26b10dc98df4d8caf272f5e
-
SHA512
e7aca103565635e73a5ce0fe64027dfdec356390f39537aec134611a6aeee176f666e5aada2cae90cebb7d3002bce43c0c251a79f28d95a09ca1a36e159dd513
-
SSDEEP
12288:vj3ZrR7VyT/IdT5D7E61U6NolW1M6wRs:vj9Rs/IdFPU6+l0
Malware Config
Extracted
formbook
nrln
IG7zJSm49UqTTuu/N/oTCIg=
CVLdAPgw0CRSMuZnRRU=
PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG
5i6p4GeQqtBgNRfGNQ==
5984keYswxh8mGZHz4ipAHtQ
VNJaK4Gh0CrOvHpW/p353A==
71rEtrL2icToyKGhcWrTxjsFU5T98zeO
r3q1sy1iZaL+2XIUAob7yw==
9+83Qkrk/vV/jVXsDvoTCIg=
aMFAgYF1prov8/UErH/Y1A==
Alqtx/0rxwEbCLdudftl
ImCbnglBSUHF0mv2tTSP40bPeYao
s4DFNvAJ4GIJ+g==
phOa6mtS8QQICuZnRRU=
7TSu5vqRtB45EZtf4WDSTBHPeYao
ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=
HF7jKjbGox2SAffTPw==
yAM3mOQot5l+cD0ikR5MGp8=
UYzW0/8z70JcQenVLidu1kLPeYao
OoCznp5UWz+hT9OBFXbfVhXPeYao
RZAWUeouUqpRAffTPw==
qQZsaG6uSqBRXS0J4PoTCIg=
idE3YO0X4GIJ+g==
NZQvYOWIBkHd4Z7AmQwAslxY
1KTdRR1OPJb88A==
8iap4OQKp/C3gQludftl
9Tyi5kaIC/Dk7JRTK/5lx1LLzRi53w==
3Lbm4soAuhRHLuZnRRU=
F4rw7+2RqgQp3urIPPoTCIg=
WcAxntfwcZZxHdfbgtoL1FbLzRi53w==
Cb4Mn+LGQzI=
v6zC+zJc9ggtoRfSUKT5VgjPeYao
8SNotqm7G3gx
zkfYBpVE7kZy6Z1eRBc=
fGC3taUlU5/grJFa/p353A==
guxOQaxAp/H3/7hudftl
1ySVyYygrPSWgzsz5voTCIg=
kgzOYyfN4GIJ+g==
uI3MyBlFYb9zLp9O/p353A==
LiJEdPqeLRv/dUMZph0=
P44MT+MPGVCfAffTPw==
92zQztuUoOD397dudftl
KAIeV2q7G3gx
16rd9Lv/EDB9NuZnRRU=
Zq8rUUtzFDYhDLdudftl
0TzN9nwSt9Ld5oQMz8oX7KcwExI=
8C4/Zed9GAoGCuZnRRU=
0R6HvJ+vT2pZMuZnRRU=
PXCroG2LPYhB92PmoRh6SNSmrvNCcT8=
jcoShE+OVbsoB4Vm
XKDr2FEDkRYoA6F7B3bfVhXPeYao
lxlqoFqiNTE=
gth+8scYHF4q9oJM/p353A==
kV6UlVdWZM+9b/WfNw==
mMkJeLvrdq91ULk=
Nxw5ckJtib7+oGdQ/p353A==
K4vu5D5UecNAxJtKPxM=
abYdRE3u8iYkqH9x
KnPrFJC5zSp1V9mCQbIDbiMamCw7zg==
DXEGJOvxscsrAcaZBs0qfqcwExI=
JxA3dYsfQKRsEMqqNrMQekNL0+MJaAkWNg==
Q4dtrcgmnb1BThr40YjqkyMQ3A==
7l7NPgxGZMGfhgludftl
MYT9Mshe6ejKfvG1lYXezH0WmCo61w==
sincewordsmatter.com
Extracted
xloader
3.8
nrln
IG7zJSm49UqTTuu/N/oTCIg=
CVLdAPgw0CRSMuZnRRU=
PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG
5i6p4GeQqtBgNRfGNQ==
5984keYswxh8mGZHz4ipAHtQ
VNJaK4Gh0CrOvHpW/p353A==
71rEtrL2icToyKGhcWrTxjsFU5T98zeO
r3q1sy1iZaL+2XIUAob7yw==
9+83Qkrk/vV/jVXsDvoTCIg=
aMFAgYF1prov8/UErH/Y1A==
Alqtx/0rxwEbCLdudftl
ImCbnglBSUHF0mv2tTSP40bPeYao
s4DFNvAJ4GIJ+g==
phOa6mtS8QQICuZnRRU=
7TSu5vqRtB45EZtf4WDSTBHPeYao
ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=
HF7jKjbGox2SAffTPw==
yAM3mOQot5l+cD0ikR5MGp8=
UYzW0/8z70JcQenVLidu1kLPeYao
OoCznp5UWz+hT9OBFXbfVhXPeYao
RZAWUeouUqpRAffTPw==
qQZsaG6uSqBRXS0J4PoTCIg=
idE3YO0X4GIJ+g==
NZQvYOWIBkHd4Z7AmQwAslxY
1KTdRR1OPJb88A==
8iap4OQKp/C3gQludftl
9Tyi5kaIC/Dk7JRTK/5lx1LLzRi53w==
3Lbm4soAuhRHLuZnRRU=
F4rw7+2RqgQp3urIPPoTCIg=
WcAxntfwcZZxHdfbgtoL1FbLzRi53w==
Cb4Mn+LGQzI=
v6zC+zJc9ggtoRfSUKT5VgjPeYao
8SNotqm7G3gx
zkfYBpVE7kZy6Z1eRBc=
fGC3taUlU5/grJFa/p353A==
guxOQaxAp/H3/7hudftl
1ySVyYygrPSWgzsz5voTCIg=
kgzOYyfN4GIJ+g==
uI3MyBlFYb9zLp9O/p353A==
LiJEdPqeLRv/dUMZph0=
P44MT+MPGVCfAffTPw==
92zQztuUoOD397dudftl
KAIeV2q7G3gx
16rd9Lv/EDB9NuZnRRU=
Zq8rUUtzFDYhDLdudftl
0TzN9nwSt9Ld5oQMz8oX7KcwExI=
8C4/Zed9GAoGCuZnRRU=
0R6HvJ+vT2pZMuZnRRU=
PXCroG2LPYhB92PmoRh6SNSmrvNCcT8=
jcoShE+OVbsoB4Vm
XKDr2FEDkRYoA6F7B3bfVhXPeYao
lxlqoFqiNTE=
gth+8scYHF4q9oJM/p353A==
kV6UlVdWZM+9b/WfNw==
mMkJeLvrdq91ULk=
Nxw5ckJtib7+oGdQ/p353A==
K4vu5D5UecNAxJtKPxM=
abYdRE3u8iYkqH9x
KnPrFJC5zSp1V9mCQbIDbiMamCw7zg==
DXEGJOvxscsrAcaZBs0qfqcwExI=
JxA3dYsfQKRsEMqqNrMQekNL0+MJaAkWNg==
Q4dtrcgmnb1BThr40YjqkyMQ3A==
7l7NPgxGZMGfhgludftl
MYT9Mshe6ejKfvG1lYXezH0WmCo61w==
sincewordsmatter.com
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4656 set thread context of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 4260 set thread context of 684 4260 aspnet_compiler.exe 45 PID 4260 set thread context of 684 4260 aspnet_compiler.exe 45 PID 5060 set thread context of 684 5060 cscript.exe 45 -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 684 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 4260 aspnet_compiler.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe 5060 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4260 aspnet_compiler.exe Token: SeDebugPrivilege 5060 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 4656 wrote to memory of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 4656 wrote to memory of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 4656 wrote to memory of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 4656 wrote to memory of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 4656 wrote to memory of 4260 4656 DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe 81 PID 684 wrote to memory of 5060 684 Explorer.EXE 86 PID 684 wrote to memory of 5060 684 Explorer.EXE 86 PID 684 wrote to memory of 5060 684 Explorer.EXE 86 PID 5060 wrote to memory of 1520 5060 cscript.exe 90 PID 5060 wrote to memory of 1520 5060 cscript.exe 90 PID 5060 wrote to memory of 1520 5060 cscript.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe"C:\Users\Admin\AppData\Local\Temp\DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1520
-
-