Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2023, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Docs.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Shipping Docs.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
Shipping Docs.exe
-
Size
18KB
-
MD5
f58167d0e2b3692dbac5b35b8907e414
-
SHA1
5cfaae6b595f0140ea0afa0f4e76ee23474edaae
-
SHA256
4cba59fde5a74d8e86638c65299b51adacc0ce2af56c1f17cb27c13bf5bb2263
-
SHA512
e5784c68b0145666b46117deb7276aa20c142306715180501ff9c91a574f7b4f3a2957924111728304a761f317cf63667bbcfa6cb4517cd445ed15736a91766d
-
SSDEEP
384:X2YZbVxZ4gddXpj3fIQS3l1Hok0NGHISSNZfTQL3:meowdN3sMpGKc7
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3192 set thread context of 4656 3192 Shipping Docs.exe 92 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe 3192 Shipping Docs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3192 Shipping Docs.exe Token: SeDebugPrivilege 4656 jsc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4768 3192 Shipping Docs.exe 82 PID 3192 wrote to memory of 4768 3192 Shipping Docs.exe 82 PID 3192 wrote to memory of 4328 3192 Shipping Docs.exe 83 PID 3192 wrote to memory of 4328 3192 Shipping Docs.exe 83 PID 3192 wrote to memory of 2304 3192 Shipping Docs.exe 84 PID 3192 wrote to memory of 2304 3192 Shipping Docs.exe 84 PID 3192 wrote to memory of 4708 3192 Shipping Docs.exe 85 PID 3192 wrote to memory of 4708 3192 Shipping Docs.exe 85 PID 3192 wrote to memory of 4740 3192 Shipping Docs.exe 86 PID 3192 wrote to memory of 4740 3192 Shipping Docs.exe 86 PID 3192 wrote to memory of 4672 3192 Shipping Docs.exe 87 PID 3192 wrote to memory of 4672 3192 Shipping Docs.exe 87 PID 3192 wrote to memory of 4688 3192 Shipping Docs.exe 88 PID 3192 wrote to memory of 4688 3192 Shipping Docs.exe 88 PID 3192 wrote to memory of 4724 3192 Shipping Docs.exe 89 PID 3192 wrote to memory of 4724 3192 Shipping Docs.exe 89 PID 3192 wrote to memory of 4748 3192 Shipping Docs.exe 90 PID 3192 wrote to memory of 4748 3192 Shipping Docs.exe 90 PID 3192 wrote to memory of 4756 3192 Shipping Docs.exe 91 PID 3192 wrote to memory of 4756 3192 Shipping Docs.exe 91 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 PID 3192 wrote to memory of 4656 3192 Shipping Docs.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Docs.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Docs.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:4768
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:4328
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:2304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:4708
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:4740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:4672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:4688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:4724
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:4748
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:4756
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4656
-