Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08/02/2023, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
Payment-Advice.exe
Resource
win7-20221111-en
General
-
Target
Payment-Advice.exe
-
Size
2.6MB
-
MD5
3e416710f120b91849b1878d07ecacd0
-
SHA1
71eb6640520773803b0201cf4466ff57cb3ac81f
-
SHA256
a56fd898ced9c080955b0ee12f4d652bd1b74ddde43470e94033a288e2b97dfc
-
SHA512
3dd24bbff081711efb22f9c4b056e820fbbb45722ef911c7b9bf68b91ed436b2f16af95d2970b29c1d77858f922b4e91b8f2d61856d06d31731de983a796b451
-
SSDEEP
49152:l0LiB3F6szZwltsrSKYsbCNICNfoAgQflqB:l3F62ZwDqSsbODNfoAgqK
Malware Config
Extracted
formbook
4.1
gune
artentarn.net
allstarpurchaslng.com
lendhave.quest
3yza.com
qpyikn.shop
play-fortuna-win-15.top
jaspergirl.store
naranjacanelaymiel.online
hiddenvalley-farms.com
gas-grills-66023.com
fp-wp.com
livepix.ltda
liholagroup.com
erlinjobs.com
doctorhooper.net
sggwmdkk.shop
ujuyzw.shop
gameclubzeed.com
myhomewish.com
ontopageone.com
startupsoffering.site
lametododemiguel37.site
premiumofadvertify.info
remarkabledeals.net
crazycoingame.com
allaimages.com
langesjewelry.com
jamtopia.xyz
kunstraum3003.com
oneconclave.com
loversheart.mom
sardegnasolare.com
philippevieux.net
emagrecacomsaude.life
mxs-lv.shop
thewildfire.capetown
pm4xe.xyz
saadev.games
irecoveryinc.com
futurdefs.com
u-too.solar
clabbery.pro
mgsiren.com
moshi-moshi-store.com
louisapham-storegame.site
hebdmt.com
grompert.com
gkfesta.store
briskwinds.com
amazingdigitalart.online
kingfisher-outdoors.com
characterai.dev
291489.com
bombbash.com
domight.live
cqetciso.com
calumniato.com
shandongfangba.com
d22c2.com
cool-video-games.net
digital-marketing-works-1.life
novadeyelopment.com
orneksite.online
instant-ontvangst.info
tylermarkconforti.com
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/1700-55-0x0000000004A30000-0x0000000004CB6000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1888-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1888-67-0x000000000041F0F0-mapping.dmp formbook behavioral1/memory/1888-69-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1628-75-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1628-80-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1700 set thread context of 1888 1700 Payment-Advice.exe 30 PID 1888 set thread context of 1216 1888 MSBuild.exe 19 PID 1628 set thread context of 1216 1628 svchost.exe 19 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 320 powershell.exe 1888 MSBuild.exe 1888 MSBuild.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1216 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1888 MSBuild.exe 1888 MSBuild.exe 1888 MSBuild.exe 1628 svchost.exe 1628 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1700 Payment-Advice.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 1888 MSBuild.exe Token: SeDebugPrivilege 1628 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1700 wrote to memory of 320 1700 Payment-Advice.exe 28 PID 1700 wrote to memory of 320 1700 Payment-Advice.exe 28 PID 1700 wrote to memory of 320 1700 Payment-Advice.exe 28 PID 1700 wrote to memory of 320 1700 Payment-Advice.exe 28 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1700 wrote to memory of 1888 1700 Payment-Advice.exe 30 PID 1216 wrote to memory of 1628 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1628 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1628 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1628 1216 Explorer.EXE 31 PID 1628 wrote to memory of 864 1628 svchost.exe 32 PID 1628 wrote to memory of 864 1628 svchost.exe 32 PID 1628 wrote to memory of 864 1628 svchost.exe 32 PID 1628 wrote to memory of 864 1628 svchost.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Payment-Advice.exe"C:\Users\Admin\AppData\Local\Temp\Payment-Advice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe purecrypter.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:864
-
-