Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/02/2023, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT FOR INV-N102.exe
Resource
win7-20220812-en
General
-
Target
PAYMENT FOR INV-N102.exe
-
Size
569KB
-
MD5
be1645867fa6422fc02f52fd1a9b91e2
-
SHA1
98673b3df49489e144da5f457515cfba84873b75
-
SHA256
c4be26f16b500a69a26c344c7840ac5aee9fa4f32cca050924a848019ed29bbd
-
SHA512
605e5db25959b15de67f7ce5a70c062258c0d17a0e7de932e488bad214b4c6b9b3c60e9219b36185df351baa469c100822c2a296ab8bc0a494950f00f1e9d911
-
SSDEEP
12288:y8OG0deh2Q1IhJs3tm4lAy4Xpzzx9avGhctKr8z9i7+pvFCWtO:Zv07h+tmsTcpiv3Ar8zw6Rkh
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions PAYMENT FOR INV-N102.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools PAYMENT FOR INV-N102.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PAYMENT FOR INV-N102.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PAYMENT FOR INV-N102.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation PAYMENT FOR INV-N102.exe -
Loads dropped DLL 1 IoCs
pid Process 704 chkdsk.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PAYMENT FOR INV-N102.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PAYMENT FOR INV-N102.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1412 set thread context of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1936 set thread context of 1268 1936 PAYMENT FOR INV-N102.exe 13 PID 704 set thread context of 1268 704 chkdsk.exe 13 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1588 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 764 powershell.exe 1744 powershell.exe 1936 PAYMENT FOR INV-N102.exe 1936 PAYMENT FOR INV-N102.exe 1936 PAYMENT FOR INV-N102.exe 1936 PAYMENT FOR INV-N102.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1936 PAYMENT FOR INV-N102.exe 1936 PAYMENT FOR INV-N102.exe 1936 PAYMENT FOR INV-N102.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe 704 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 764 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 1936 PAYMENT FOR INV-N102.exe Token: SeDebugPrivilege 704 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1744 1412 PAYMENT FOR INV-N102.exe 27 PID 1412 wrote to memory of 1744 1412 PAYMENT FOR INV-N102.exe 27 PID 1412 wrote to memory of 1744 1412 PAYMENT FOR INV-N102.exe 27 PID 1412 wrote to memory of 1744 1412 PAYMENT FOR INV-N102.exe 27 PID 1412 wrote to memory of 764 1412 PAYMENT FOR INV-N102.exe 30 PID 1412 wrote to memory of 764 1412 PAYMENT FOR INV-N102.exe 30 PID 1412 wrote to memory of 764 1412 PAYMENT FOR INV-N102.exe 30 PID 1412 wrote to memory of 764 1412 PAYMENT FOR INV-N102.exe 30 PID 1412 wrote to memory of 1588 1412 PAYMENT FOR INV-N102.exe 32 PID 1412 wrote to memory of 1588 1412 PAYMENT FOR INV-N102.exe 32 PID 1412 wrote to memory of 1588 1412 PAYMENT FOR INV-N102.exe 32 PID 1412 wrote to memory of 1588 1412 PAYMENT FOR INV-N102.exe 32 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1412 wrote to memory of 1936 1412 PAYMENT FOR INV-N102.exe 34 PID 1268 wrote to memory of 704 1268 Explorer.EXE 35 PID 1268 wrote to memory of 704 1268 Explorer.EXE 35 PID 1268 wrote to memory of 704 1268 Explorer.EXE 35 PID 1268 wrote to memory of 704 1268 Explorer.EXE 35 PID 704 wrote to memory of 1624 704 chkdsk.exe 38 PID 704 wrote to memory of 1624 704 chkdsk.exe 38 PID 704 wrote to memory of 1624 704 chkdsk.exe 38 PID 704 wrote to memory of 1624 704 chkdsk.exe 38 PID 704 wrote to memory of 1624 704 chkdsk.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT FOR INV-N102.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT FOR INV-N102.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT FOR INV-N102.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pFQgzESg.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pFQgzESg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9DA7.tmp"3⤵
- Creates scheduled task(s)
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT FOR INV-N102.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT FOR INV-N102.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f90e996c7f9dc700498a50beb24635c2
SHA17b0072a0a0adf2da59243bcd55b755c8c9971964
SHA256286ea21761b1a1a66f9a088514bbe465d0c1f178d909c18b9c4baf2b40497aa1
SHA512b0bd5adc06b8b40c99d28d49cedcb53d8d614ae6ca4dc12752fe0acd2c77d7740ce047ffe783d2451ac837813f0ba15a110eda1ea9b3a25a5b349e79d962e0cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e36c69189487181bcdfb2c4705cfd2b1
SHA16f8e1894d962051169bd00791d6036a171cfdda1
SHA2565bcb4f062e4bfd835f8d617f0bef014f8e704e2d725878df2e2c66d3a9cdbe88
SHA512ffc911a22b5ac993d56a2e07df343ee239680f87c3f760e2ecae9d340d23632735a38378121d2228eac82400397fa101cd1dd0b4ecddeb720da8ef64f9e78a98
-
Filesize
1.0MB
MD5f1e5f58f9eb43ecec773acbdb410b888
SHA1f1b8076b0bbde696694bbc0ab259a77893839464
SHA256a15fd84ee61b54c92bb099dfb78226548f43d550c67fb6adf4cce3d064ab1c14
SHA5120aff96430dd99bb227285fefc258014c301f85216c84e40f45702d26cdd7e77261a41fd3811d686f5fb2ee363cc651a014e8ffa339384004cece645a36486456