Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/09/2022, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
Invoice 16-36-55.exe
Resource
win7-20220812-en
General
-
Target
Invoice 16-36-55.exe
-
Size
918KB
-
MD5
c5b76d08e1571dfd19d3ab265ec85b2f
-
SHA1
e9efd2d3ed741511025c1f1b0f1eb1d97aab111d
-
SHA256
10610b7b6275e7e957ad8992b94b7488d1d55ad72a169f1abc5410f10c717484
-
SHA512
bc99f126b422cf373af6f5851e7368471e0505e56a42f207a2d79b407fb3de95ebc1defe1ee0cfbaf46f09b3a514ebd45b3ca0195fdf0f8e2d94fc339138bd6a
-
SSDEEP
12288:Rj9dHqkbfDk3OLqKGTSXzurVj0dEaVj6NAIZuH9lu08jexVbQLJKKmIjYUkt+pLk:RRhHUKGTSXzuBjVZNNelu0FCI
Malware Config
Extracted
formbook
d6iz
FkA/Rc+zw+0paU+GEiQh+g==
u54Xp6nujzFowU4P
EOvDCsjIcMgdORQ=
AuwHDKo90fNowU4P
pgyJWSAeSn6PEafn3w==
3uX1Rw+ed9vrNQ==
jF5ap2Dv9C1PwGrd2Q==
HO748Nunv9ftKA==
Y3nTdCLF3gspa0+HEiQh+g==
sTcJEshxAzXL5wGzPaA=
E/w4u2Vb6henwGrd2Q==
HyiDPgQFmbk/EuMX3D7NrWLX0XU=
E2QDkA/Sapg7+GJV8ULKrGLX0XU=
OSgyD3k1WHd+8vQc48OmEfvTww==
AVwcD5BnNY6o588P2A==
OghAuUYpwNlqf3CtJsAyRL5h
qQbNBg5d+StQ22hVZXWVOK0=
/+bLGhaIK8gdORQ=
2EwZLB/UCA4=
he9L+LfD0TAFfsIA0Q==
39618LhWaZvFYcmHRZXRdlP8r8oP1L0=
s7z1wnx7m8vuarJ0NQUQ+A==
RyUzJ6hvlb/PDPNnfm56kmLX0XU=
lGpuWceFkcDmIxiWm1RDUkZZSLDxqLU=
Gw8aZzXP6A0hbk2DEiQh+g==
A1OnXBwvSGd0zkRERBqUd2LX0XU=
+BPlBoBXZqk880VGyZYJ
g0xlb+WjwuWLgGWbcSv646L/7H8=
QJAb8Ky20/5owU4P
o+yuwjj3Di0jnS9Z23kn/A==
u4BRnGoEFj9P5CyVORHEcFtp
FtwduryHKlPj6wGzPaA=
Xbc3/b5W8AZowU4P
rPhPpSDngq1C+UsryHWVOK0=
syvlOXcw1gQ=
HohUbfe/2AsZ5w+DI/RgP68qWQ2mSgckgg==
0KqIYc+jrOCmG2MV6ag=
6FHvXMR2IjRPwGrd2Q==
R8BFEszM4gVowU4P
IvwA+63AygOngvi4d9akV0Vc0wOKd7VegA==
I4E9TOq41fsEeA+DkHVXNLM=
9AlZ/7rBbsgdORQ=
+OC04r6Eo9F4d2uhayIoDq1wVQWdd7VegA==
e3WsF6RpyjevxK/ZrHp4EfvTww==
QziB7m9B5vkSQT++x0TLqWLX0XU=
TzY/OfABE0hr5lZGyZYJ
2/H8M9zKaqc0LCAsIgKcNKpMywp1
DftB17B9ibO5ClPid8+nkVlURLDxqLU=
8uA1zIIpLnaDxwTEh24+8g==
OIDzSLeLIznIiQ4I+8ZIVUVc0wOKd7VegA==
4lgaJrFzltDngBZkkXWVOK0=
Xsh3w6fahaxN/Zch6GQ88g==
hG58dhQaSFdg8FZGyZYJ
AOjxKuvwlM57Q8WRYUODEfvTww==
OQXRB8m/ZpUo8Gsr1yEgFpVF7umNGg==
18H/jhTkhKJBEIBiA2vpo1taR7DxqLU=
Oy5p8Y8XN2P46wGzPaA=
tvKq+Y4OdX2y
uzj88HJDWoCXPrhdJw3EcFtp
kuRvAsbTc8gdORQ=
Jqg1/uq0TIIl3DD3sVH1oFbZxQ==
x4q5Kp5yCi7Plh9HFNvNrWLX0XU=
3c3UrRPE3B8vX1rIXca+tWs57umNGg==
vKWtpVlnhK6yJ48Qn+OoVt2mQvlwEA==
cki3714.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation Invoice 16-36-55.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1680 set thread context of 1520 1680 Invoice 16-36-55.exe 32 PID 1520 set thread context of 1208 1520 Invoice 16-36-55.exe 16 PID 1396 set thread context of 1208 1396 wininit.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1444 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wininit.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1680 Invoice 16-36-55.exe 1680 Invoice 16-36-55.exe 1756 powershell.exe 1520 Invoice 16-36-55.exe 1520 Invoice 16-36-55.exe 1520 Invoice 16-36-55.exe 1520 Invoice 16-36-55.exe 1396 wininit.exe 1396 wininit.exe 1396 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1520 Invoice 16-36-55.exe 1520 Invoice 16-36-55.exe 1520 Invoice 16-36-55.exe 1396 wininit.exe 1396 wininit.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1680 Invoice 16-36-55.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 1520 Invoice 16-36-55.exe Token: SeDebugPrivilege 1396 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1756 1680 Invoice 16-36-55.exe 28 PID 1680 wrote to memory of 1756 1680 Invoice 16-36-55.exe 28 PID 1680 wrote to memory of 1756 1680 Invoice 16-36-55.exe 28 PID 1680 wrote to memory of 1756 1680 Invoice 16-36-55.exe 28 PID 1680 wrote to memory of 1444 1680 Invoice 16-36-55.exe 30 PID 1680 wrote to memory of 1444 1680 Invoice 16-36-55.exe 30 PID 1680 wrote to memory of 1444 1680 Invoice 16-36-55.exe 30 PID 1680 wrote to memory of 1444 1680 Invoice 16-36-55.exe 30 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1680 wrote to memory of 1520 1680 Invoice 16-36-55.exe 32 PID 1208 wrote to memory of 1396 1208 Explorer.EXE 33 PID 1208 wrote to memory of 1396 1208 Explorer.EXE 33 PID 1208 wrote to memory of 1396 1208 Explorer.EXE 33 PID 1208 wrote to memory of 1396 1208 Explorer.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Invoice 16-36-55.exe"C:\Users\Admin\AppData\Local\Temp\Invoice 16-36-55.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ilrVEAfwYEj.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ilrVEAfwYEj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8D33.tmp"3⤵
- Creates scheduled task(s)
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\Invoice 16-36-55.exe"C:\Users\Admin\AppData\Local\Temp\Invoice 16-36-55.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56db7bc5a432d383726ce378253af7bb6
SHA125a6d939663ee6468d8691698b8827c2918c44ca
SHA256f05da292060097110bcc488598b9d64556107179486e5794bfe6959b77c2a1fc
SHA512486d435f65dfa4784f2f253a806801fb313d7be0d1c2ef0cc351ce24bf138e552aa6aff5b041cb1a938b05c54c7948723930ab9193000b6c3252a9862c00c430