Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe
Resource
win10v2004-20221111-en
General
-
Target
rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe
-
Size
168KB
-
MD5
91291b0c1fb27cff77c5a7731807abf0
-
SHA1
0cdd5dcdf23c65136faf067d55a098f1fb93469f
-
SHA256
ede3136fd45a022bb470ff9a2752d4b48c641e1fe6ddc4aa5fa3a414b6921b95
-
SHA512
65632a66c7cb3fdbdf0e89de5298b378597e96e8a1a96f232669dd7a70235b428b45f529f6175555ea67ad987dbdfade0697b3ee440bfebf9a473db3279b490a
-
SSDEEP
3072:pVmADg66x5y7FuW3jLi2ikZSYbmlpSchjDeL8lOW+9d+zr3/1C:pVA665pW3Z7ZS9h2LjOM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ianvmjrr.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Identities\\ianvmjrr.exe\"" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1516 set thread context of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe Token: SeDebugPrivilege 1264 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1264 Explorer.EXE 1264 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1264 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1516 wrote to memory of 1416 1516 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 28 PID 1416 wrote to memory of 1628 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 29 PID 1416 wrote to memory of 1628 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 29 PID 1416 wrote to memory of 1628 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 29 PID 1416 wrote to memory of 1628 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 29 PID 1416 wrote to memory of 1264 1416 rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe 20 PID 1264 wrote to memory of 1120 1264 Explorer.EXE 15 PID 1264 wrote to memory of 1184 1264 Explorer.EXE 23
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe"C:\Users\Admin\AppData\Local\Temp\rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exeC:\Users\Admin\AppData\Local\Temp\rechnung_vodafone_team_0000399387201_0020398478002_0003_77352_192_0200002.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\MS9068~1.BAT"4⤵
- Deletes itself
PID:1628
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD556d8d1d756a52838c8c8e362aa327cb1
SHA1914be71710c0f3955d04f3be74d760bd1ba9f9f5
SHA2567ef50eaec707347f7bf540a24113a48e9f630912b10e76d1c18806cf39283aff
SHA512c1ff62e371b18c7f56f88b81abc5207df351992162d8c27cebb4f6322108fc73ce67fd34b24d3c7f8c11104dede9490222f87a28a264008863b0430f86f76323