Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2023, 15:36

General

  • Target

    Shipment_notification.exe

  • Size

    754KB

  • MD5

    c310a64af890ac32abff89e86cb53a33

  • SHA1

    509cdec4d058011fb55535a936e56d3158f3f05a

  • SHA256

    90e86051c2fb04a3f6fda85273580abca9a9131fb5e32065f620c4410febe1af

  • SHA512

    095334ee039c7c70b5459b16f1e8d66b56cb7847d3769859182ef5764a8fcb6720cddbc20fc7b5a2c87a6ec4141a70b537e59e27f7fd2ff57c0c325e1b803fce

  • SSDEEP

    12288:PIrmYMUnFW/NObV55FbasbtrKnnRy50vHKB0otonixVtd/FmQSBhVa8i6NFJHKoR:PIrUUj5FbfVoy5hB0hnixT9FHI04qooW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe
      "C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe
        "C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:980
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\80atjr.zip

      Filesize

      465KB

      MD5

      9e480b43cbe052e9ab25a0b982132e4d

      SHA1

      511ed863e48b8755e43b093238b923339c1bf846

      SHA256

      d76c2b3b27f279cbaabaa2d53c93e4bb7f2d8336e5aff7c74d7a16a2dbfbfb1c

      SHA512

      92a2753d125fec5a77945a1724dd85d07fd672583666029e313903584cf8e872fae9f3bb1db00cb9cde747edd4e3e95c8ffc3aa2867ce9212504d557e2adc8fb

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      890KB

      MD5

      8402a6aa76d7787ff03943dd129e3d83

      SHA1

      895338cb761d62930ca93918011fd2cd33d5b30c

      SHA256

      49ff99d5b24f4f7d5a8ea175f35a6548c74b04e5c621c60121b5088dab19b4eb

      SHA512

      39bbe90385be35492825929296aae771fb4afb00a1f6a48f0e4ec17bc1097c3a32cea3b22033116c82695e66acbd6c847483a8da21e7302240467b58e39169ea

    • memory/980-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/980-67-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/980-68-0x0000000000160000-0x0000000000170000-memory.dmp

      Filesize

      64KB

    • memory/980-66-0x0000000000840000-0x0000000000B43000-memory.dmp

      Filesize

      3.0MB

    • memory/980-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/980-61-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/980-62-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/980-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1060-72-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/1060-70-0x0000000000E50000-0x0000000000F54000-memory.dmp

      Filesize

      1.0MB

    • memory/1060-71-0x0000000000E50000-0x0000000000F54000-memory.dmp

      Filesize

      1.0MB

    • memory/1060-73-0x0000000002360000-0x0000000002663000-memory.dmp

      Filesize

      3.0MB

    • memory/1060-122-0x0000000061E00000-0x0000000061ECA000-memory.dmp

      Filesize

      808KB

    • memory/1060-76-0x0000000000B30000-0x0000000000BBF000-memory.dmp

      Filesize

      572KB

    • memory/1148-56-0x00000000003D0000-0x00000000003E4000-memory.dmp

      Filesize

      80KB

    • memory/1148-59-0x00000000057A0000-0x0000000005850000-memory.dmp

      Filesize

      704KB

    • memory/1148-58-0x0000000000680000-0x000000000068C000-memory.dmp

      Filesize

      48KB

    • memory/1148-57-0x0000000001290000-0x00000000012D0000-memory.dmp

      Filesize

      256KB

    • memory/1148-60-0x0000000000AE0000-0x0000000000B18000-memory.dmp

      Filesize

      224KB

    • memory/1148-54-0x0000000001300000-0x00000000013C2000-memory.dmp

      Filesize

      776KB

    • memory/1148-55-0x0000000001290000-0x00000000012D0000-memory.dmp

      Filesize

      256KB

    • memory/1320-69-0x0000000004FD0000-0x00000000050D4000-memory.dmp

      Filesize

      1.0MB

    • memory/1320-79-0x000007FEBBCD0000-0x000007FEBBCDA000-memory.dmp

      Filesize

      40KB

    • memory/1320-78-0x0000000006C40000-0x0000000006D4A000-memory.dmp

      Filesize

      1.0MB

    • memory/1320-75-0x0000000006C40000-0x0000000006D4A000-memory.dmp

      Filesize

      1.0MB