Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/12/2022, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Official Purchase Order 121322.exe
Resource
win7-20220812-en
General
-
Target
Official Purchase Order 121322.exe
-
Size
1019KB
-
MD5
9e40b98924b94ea375faf0bccf2609ee
-
SHA1
bbb2330799adfffd534505aac9ac112e16f7fc8e
-
SHA256
4b4faaccc4842d408c3caad47e364f69dad51765ab242e4dc8c97de0cd190ddc
-
SHA512
c2a3f6653962664b1d830edee1c84ac9a62e1d908b647c6f88f1b21837c3316177c445ea2af17c0326e79d9bf3b5d4b266fbbb3a87b2eb12ffa1cc972a23b9db
-
SSDEEP
24576:wGTgVIYba1JXh+Q/Fkq1SW0vQ2lBS4G3r5/oOi3bJhxVsWy:wGT6Iz3RJtkqh0vQ2
Malware Config
Extracted
formbook
snky
AiMFvkl6+A4HEgZ99q5x4naN7lGmvJo=
tvj/KUTKeKgxszIemQ==
DTrTokBrjB5leF4=
tPeTOuIjJPtH
taxtMdIygEdpskxzOQ2ZjoAEeA==
CxLuaKAFRrJyuIqQUPbhZw==
Tn4fapT5kPmk1H0gpXQ=
h5p8hDqGSiRzdSbV
i3lg8tbRNRU6jC9pQSOxzHYZgpbnOKBx
EwbfBo6m+UXU2qaVUPbhZw==
WpeenFSMquJ3xXD1/b43
niV5qTFu3tfmcgrI
fqyyyElbdxWswJ7A
Lh7o92ZOr4ghbwvK
Y2RYMDue4x+KszIemQ==
lN3Y3z5AS85eah1MDvfFQQA=
uq+Oqh8MNRxHOOkqA9lqYEZZhJU=
FEtGDeGnnRoSQEM=
TkMlruotvsmtpFwg6shr03LjwMWGow==
7PGx8hNMep8EMj5Q39dsq16IbbaIrA==
JWBJ1NPwDiQGtx/1/b43
jLyxuI7yXHuMCAAEo4w2
u8emc+77PGLK1m71/b43
x/CcdfoDSCRZnVXDPRSpyXmY8VGmvJo=
KVhmdDtqi+J1szIemQ==
wsdvKMDzVJnqRRgHkQ==
t7qiOXzCVU8uTkrIRfwcGc3MSI4=
KmYObYWgvRG0NUY=
nAjQEiY0lBR3szIemQ==
Rbp9QuwhlL3Y6n0gpXQ=
9i/2sO0wWSEWFN1VSTPOC7s4
D3mUkmojJPtH
9j9GR6fFQB5leF4=
xgbp6k8+ov9wcVRTFshikCZFcA==
aWX+xof8Okn/Uuku87rXRjMObIg=
eoNOhYB9un2qA/7BczPs5Zow
2kojAargCM7IyqgrpHwFKbyNjtQU
y/zzintehOseIvyhZ/kDfx4=
YXZNaeznGso2Kkk=
GQyw87qm1C7hMOLb56xmcRg=
gnhB/W9glMlovyXzX2M=
/gTb6IIzhtlsszIemQ==
2fykfBhO0wIGGB+bIbX48vyNjtQU
fLG3th9M26TDQcwJ3rhAbw==
gYBibCt5+mkhszIemQ==
Mi/qtVF8lR5leF4=
+osZ4s4sfzWTmA==
P1bvKyhWmoIcNgpGUPbhZw==
tMR5NMrQNkZ5ynv1/b43
FEJcaBIWVA0qfh1GUPbhZw==
DT4eVFxUjh5leF4=
Vo6XENrMLrVRVhnMjQXkeQk=
gMjK4FdEoqrdLt+edDrs5Zow
HVTpxnKwL8wkcCtAwHw=
E6AxvSU83Q==
cZo27n9MYTcGQEM=
TI52b9eXk5vmcgrI
ERLi/Ii6F/1Yop3wxqYtazMObIg=
4xO77Ma1ILuS1H0gpXQ=
EuWM4vsLahvPCQb1/b43
EDhHQvo3aRJreGabWzYAeQ==
nNXES0A+b9Kj9ZaBgGw=
ERz8ic0GIJfIxoQ79dShF63fAA3QHcSDFw==
Pm9i8+HMLb1+wn0gpXQ=
lodehewulan.yachts
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 320 msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation Official Purchase Order 121322.exe -
Loads dropped DLL 1 IoCs
pid Process 320 msiexec.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1848 set thread context of 1304 1848 Official Purchase Order 121322.exe 30 PID 1304 set thread context of 1216 1304 Official Purchase Order 121322.exe 18 PID 1304 set thread context of 1216 1304 Official Purchase Order 121322.exe 18 PID 320 set thread context of 1216 320 msiexec.exe 18 -
description ioc Process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1848 Official Purchase Order 121322.exe 1848 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 1304 Official Purchase Order 121322.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe 320 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1848 Official Purchase Order 121322.exe Token: SeDebugPrivilege 1304 Official Purchase Order 121322.exe Token: SeDebugPrivilege 320 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1708 1848 Official Purchase Order 121322.exe 28 PID 1848 wrote to memory of 1708 1848 Official Purchase Order 121322.exe 28 PID 1848 wrote to memory of 1708 1848 Official Purchase Order 121322.exe 28 PID 1848 wrote to memory of 1708 1848 Official Purchase Order 121322.exe 28 PID 1848 wrote to memory of 1308 1848 Official Purchase Order 121322.exe 29 PID 1848 wrote to memory of 1308 1848 Official Purchase Order 121322.exe 29 PID 1848 wrote to memory of 1308 1848 Official Purchase Order 121322.exe 29 PID 1848 wrote to memory of 1308 1848 Official Purchase Order 121322.exe 29 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1848 wrote to memory of 1304 1848 Official Purchase Order 121322.exe 30 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 1216 wrote to memory of 320 1216 Explorer.EXE 33 PID 320 wrote to memory of 1564 320 msiexec.exe 36 PID 320 wrote to memory of 1564 320 msiexec.exe 36 PID 320 wrote to memory of 1564 320 msiexec.exe 36 PID 320 wrote to memory of 1564 320 msiexec.exe 36 PID 320 wrote to memory of 1564 320 msiexec.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"3⤵PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"3⤵PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"C:\Users\Admin\AppData\Local\Temp\Official Purchase Order 121322.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1760
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1008
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
904KB
MD55e5ba61531d74e45b11cadb79e7394a1
SHA1677224e14aac9dd35f367d5eb1704b36e69356b8
SHA25699e91ae250c955bd403ec1a2321d6b11fcb715bdcc7cb3f63ffb46b349afde5c
SHA512712bfe419ba97ecf0ec8323a68743013e8c767da9d986f74ab94d2a395c3086cac2a5823048e0022d3bbcebb55281b9e1f8c87fdc9295c70cc5521b57850bf46