Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
sample and order.exe
Resource
win7-20220812-en
General
-
Target
sample and order.exe
-
Size
281KB
-
MD5
7dbd6df3ec4fec51110e44dd2122d166
-
SHA1
078d7b5f3453fcb85908cd9209a07766f613307f
-
SHA256
cf7fc1a1f8101f89f4b4693b664e96f88febde65bc7c0b5f9dc19ce060c45c84
-
SHA512
c17ff24eedc17ac985a894f10546761b08965cf5e4c0d7d94466546b8c723cb7140ed37a99be0af64d8abeb1d0092fd16b8e6efe96eecdcb7d62e56d8b9de3c1
-
SSDEEP
6144:PDRYLF0WnhfA+UOx85VjsXov0Df+FyUzg:rR20Wnt3KsXo8DfCywg
Malware Config
Extracted
formbook
hlpq
mldSsngjzTHzaBZba069RrUmJw==
f0b/EZNM9UFUVxE=
MDL3b5SzuL6PH/Kikfw=
OudWLtIWZJFGaA==
xXgtQAEmIRjnk2vd+TVnrkpcMA==
HNmBV2fv0mP2gxk=
faeiX5TDOI5ltFsZ
bP0KGLe8mXkxmVkO
VRZeZu3VJs1Q2mET
A9mQgvhLDCUYYg==
TvpiStz3fge+3ZpO73Vj
fBaaUHWI3y02WQXrUa5r
54L6DSGvfeO1tVb9e6sktVDY
yM0Iv3K6hwXriE3Nu+N2eB60w0VNNgo=
obVogUsv0CTETtGGNqAktVDY
zuyrKkdHKGP2gxk=
ZnYxy5BL3u+4qVgkuJufqg==
0P24HCo4h+iuJfKikfw=
gaVk/JEbvFmbJDqNk+s=
bTekCo8Z5gcepjtsjtmGzZ0=
UhfQUXquEkXUdSojVZNh
uurQ029w2zH8rUPwZaAktVDY
ZwB7AaE5Qa94rnv5IWlkEcPFcnRadiDm
/S/wfRCptgCQYD2kvQ==
xMXA/DLQOy/8CqpzfvR8
4x8YQf8HatCkVgH3UdfGE3HQ
cDy1X5TXWaCXq1TdCGGn5MQdbXv8PAHu
GMZwXhQfMjHulT4sxvGj6EdyifsPYA==
cqyUgQopoKIxmVkO
YyTadgitjqK0QeONa6P3+ow=
Dj4lq4dEJYJUWP6IAXwktVDY
eVQMwWr/xuLnexhMrutttow=
jci91t1FvPqQAY+Be61Tn4Q=
UFAQCzzxzi4LBAmRtw==
XhaKC7ZkDCUYYg==
kETqcKC1t+/rdypsh61Tn4Q=
vuanPPmWYb+HYD2kvQ==
G+VqmZEiJmh0H/Kikfw=
7Q7V86fEIIxjF+0hPrgjcHwEifsPYA==
/Am8wLUzwe7yBphTQpC8uw==
uFLWDjaHUP/BXwQ=
JT4/HCOzQkUUMu/rUa5r
/a2nbAg08EBJ
Q1sUlLjW3bq8uldTd69y
7igxbYF2uvb5HbREHkDHRrUmJw==
mE7j3//GIMKRTRY=
LMZOhaATaYyXtFHR9SAUTiZpOg==
QdRRZm/VWtSlVPPrUa5r
8Qa7zVTIK1ZN
kp5TZSNKoQzpNhMd7XNj
5/Ku3oOct+q0z5VfA0OKk5Td
Ql4m8gUVZsaf4Jpiqg==
h7+5WRm6supxfWe1x61Tn4Q=
wmQXMPITcZ0VchuNtQ==
cYY/T9e7rriUIfKikfw=
Pfr3LRJvd4o=
B46XQABQFWNe
bDgsAMvx6/KpZhnkuPQqNzpzifsPYA==
2+18kE1W0C4pYSWq5URSpnL1OQ==
E7w6u2geFWP2gxk=
O0fKwGeBzriPkjUnycPJE3fQ
OsxBrWnFe3ZJIwN3lOw2dJ+s6us=
c/xEVODh9gTfdypmh61Tn4Q=
krWmUgmfcGwvxVgbZ7T9Sl/WLy2R5aqKzg==
dbd2.top
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1516 systray.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 784 set thread context of 2020 784 sample and order.exe 26 PID 2020 set thread context of 1360 2020 Regsvcs.exe 23 PID 2020 set thread context of 1360 2020 Regsvcs.exe 23 PID 1516 set thread context of 1360 1516 systray.exe 23 -
description ioc Process Key created \Registry\User\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 systray.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2020 Regsvcs.exe 2020 Regsvcs.exe 2020 Regsvcs.exe 2020 Regsvcs.exe 2020 Regsvcs.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2020 Regsvcs.exe 2020 Regsvcs.exe 2020 Regsvcs.exe 2020 Regsvcs.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe 1516 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2020 Regsvcs.exe Token: SeDebugPrivilege 1516 systray.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 784 wrote to memory of 2020 784 sample and order.exe 26 PID 2020 wrote to memory of 1516 2020 Regsvcs.exe 28 PID 2020 wrote to memory of 1516 2020 Regsvcs.exe 28 PID 2020 wrote to memory of 1516 2020 Regsvcs.exe 28 PID 2020 wrote to memory of 1516 2020 Regsvcs.exe 28 PID 1516 wrote to memory of 1744 1516 systray.exe 31 PID 1516 wrote to memory of 1744 1516 systray.exe 31 PID 1516 wrote to memory of 1744 1516 systray.exe 31 PID 1516 wrote to memory of 1744 1516 systray.exe 31 PID 1516 wrote to memory of 1744 1516 systray.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\sample and order.exe"C:\Users\Admin\AppData\Local\Temp\sample and order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:1744
-
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
804KB
MD5b09588d000ef4bf2a3dddd85bd701423
SHA144a810ff8920a340a30b66d932253555143dc28b
SHA256ce4ffc1a12150b8523378553f2a97dd3fc44d5210ae6c296ab31e2c78f0d03c3
SHA5121d807d92da34ccba4628f2a55c3ac1c03ff63925d79e266b4e52d71002228cbde76206ec696c3e25143fc2e0cab56589155666ff6f8ea0ebfd5ebcd362168e2a