Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2023, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
Order specification.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Order specification.exe
Resource
win10v2004-20220812-en
General
-
Target
Order specification.exe
-
Size
911KB
-
MD5
6e4618e85f1366a3a526496f6537af89
-
SHA1
b1b1c0191b8b0043828ba04bfb91b5f41903459a
-
SHA256
85f9e2436c4b4743d0d509dfafeaba63bc46848a31053ffb00d35987fade8fda
-
SHA512
bf02ad607b2e778d5a8dff8321d7f906cb749e0f3f3e29c780bbb74bd713a01bbcf7b7c01b79da09727220d11cb0c2d2ef5ad274d883cba73bca9bb799860b79
-
SSDEEP
24576:Nrg6F0xMiBlOMp8vj/Vt4Uz8nTTgIdqG4yPa:3Wielf8vjdtBzakIm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Order specification.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Order specification.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2364 set thread context of 5048 2364 Order specification.exe 93 PID 5048 set thread context of 2644 5048 Order specification.exe 48 PID 3868 set thread context of 2644 3868 cmmon32.exe 48 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1260 3392 WerFault.exe 95 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1564 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 964 powershell.exe 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 964 powershell.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 5048 Order specification.exe 5048 Order specification.exe 5048 Order specification.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe 3868 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 5048 Order specification.exe Token: SeDebugPrivilege 3868 cmmon32.exe Token: SeShutdownPrivilege 2644 Explorer.EXE Token: SeCreatePagefilePrivilege 2644 Explorer.EXE Token: SeShutdownPrivilege 2644 Explorer.EXE Token: SeCreatePagefilePrivilege 2644 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2364 wrote to memory of 964 2364 Order specification.exe 89 PID 2364 wrote to memory of 964 2364 Order specification.exe 89 PID 2364 wrote to memory of 964 2364 Order specification.exe 89 PID 2364 wrote to memory of 1564 2364 Order specification.exe 91 PID 2364 wrote to memory of 1564 2364 Order specification.exe 91 PID 2364 wrote to memory of 1564 2364 Order specification.exe 91 PID 2364 wrote to memory of 5048 2364 Order specification.exe 93 PID 2364 wrote to memory of 5048 2364 Order specification.exe 93 PID 2364 wrote to memory of 5048 2364 Order specification.exe 93 PID 2364 wrote to memory of 5048 2364 Order specification.exe 93 PID 2364 wrote to memory of 5048 2364 Order specification.exe 93 PID 2364 wrote to memory of 5048 2364 Order specification.exe 93 PID 2644 wrote to memory of 3868 2644 Explorer.EXE 94 PID 2644 wrote to memory of 3868 2644 Explorer.EXE 94 PID 2644 wrote to memory of 3868 2644 Explorer.EXE 94 PID 3868 wrote to memory of 3392 3868 cmmon32.exe 95 PID 3868 wrote to memory of 3392 3868 cmmon32.exe 95 PID 3868 wrote to memory of 3392 3868 cmmon32.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Order specification.exe"C:\Users\Admin\AppData\Local\Temp\Order specification.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BFALFbmqDECDHL.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BFALFbmqDECDHL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F6C.tmp"3⤵
- Creates scheduled task(s)
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\Order specification.exe"C:\Users\Admin\AppData\Local\Temp\Order specification.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3392
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3392 -s 2084⤵
- Program crash
PID:1260
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 3392 -ip 33921⤵PID:2488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b1427818cf18391c3e1c189315a53e65
SHA1cb5c156b5929a8f4ba67d6b41560d32357557651
SHA256f91c161775ff9461de235d88d35f72a7590670d1a9732eb3772a3b6d2947cc14
SHA512f85ed805dee3f1bb830c1dd7369c561be13a769abf6b98b4a099b5500730a982c456e6347f6cb5dcb341374ab934ece3f5880000fa11a22fbd428d7ae1b87f2e