Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2023, 15:36

General

  • Target

    Shipment_notification.exe

  • Size

    754KB

  • MD5

    c310a64af890ac32abff89e86cb53a33

  • SHA1

    509cdec4d058011fb55535a936e56d3158f3f05a

  • SHA256

    90e86051c2fb04a3f6fda85273580abca9a9131fb5e32065f620c4410febe1af

  • SHA512

    095334ee039c7c70b5459b16f1e8d66b56cb7847d3769859182ef5764a8fcb6720cddbc20fc7b5a2c87a6ec4141a70b537e59e27f7fd2ff57c0c325e1b803fce

  • SSDEEP

    12288:PIrmYMUnFW/NObV55FbasbtrKnnRy50vHKB0otonixVtd/FmQSBhVa8i6NFJHKoR:PIrUUj5FbfVoy5hB0hnixT9FHI04qooW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe
      "C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe
        "C:\Users\Admin\AppData\Local\Temp\Shipment_notification.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1528
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:1644
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:1380
        • C:\Windows\SysWOW64\cmmon32.exe
          "C:\Windows\SysWOW64\cmmon32.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5088
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:2136
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2136 -s 120
                4⤵
                • Program crash
                PID:624
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 444 -p 2136 -ip 2136
          1⤵
            PID:1368

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/620-133-0x00000000000C0000-0x0000000000182000-memory.dmp

            Filesize

            776KB

          • memory/620-134-0x00000000051F0000-0x0000000005794000-memory.dmp

            Filesize

            5.6MB

          • memory/620-135-0x0000000004B70000-0x0000000004C02000-memory.dmp

            Filesize

            584KB

          • memory/620-136-0x0000000004B20000-0x0000000004B2A000-memory.dmp

            Filesize

            40KB

          • memory/620-137-0x0000000004D20000-0x0000000004D30000-memory.dmp

            Filesize

            64KB

          • memory/620-138-0x0000000004D20000-0x0000000004D30000-memory.dmp

            Filesize

            64KB

          • memory/620-139-0x0000000006480000-0x000000000651C000-memory.dmp

            Filesize

            624KB

          • memory/1528-140-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1528-142-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1528-143-0x0000000001690000-0x00000000019DA000-memory.dmp

            Filesize

            3.3MB

          • memory/1528-144-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1528-145-0x0000000001210000-0x0000000001220000-memory.dmp

            Filesize

            64KB

          • memory/3192-194-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-178-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-206-0x0000000002C80000-0x0000000002C8A000-memory.dmp

            Filesize

            40KB

          • memory/3192-205-0x0000000002C90000-0x0000000002CA0000-memory.dmp

            Filesize

            64KB

          • memory/3192-204-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-203-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-202-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-153-0x0000000009030000-0x000000000913F000-memory.dmp

            Filesize

            1.1MB

          • memory/3192-155-0x0000000009030000-0x000000000913F000-memory.dmp

            Filesize

            1.1MB

          • memory/3192-164-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-165-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-166-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-167-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-168-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-169-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-170-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-171-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-172-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-173-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-174-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-175-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-176-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-177-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-201-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-179-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-180-0x0000000003270000-0x0000000003272000-memory.dmp

            Filesize

            8KB

          • memory/3192-181-0x0000000003450000-0x0000000003460000-memory.dmp

            Filesize

            64KB

          • memory/3192-183-0x0000000003450000-0x0000000003460000-memory.dmp

            Filesize

            64KB

          • memory/3192-189-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-190-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-146-0x0000000003380000-0x0000000003447000-memory.dmp

            Filesize

            796KB

          • memory/3192-193-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-192-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-191-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-195-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-197-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-196-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-198-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-200-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/3192-199-0x0000000003480000-0x0000000003490000-memory.dmp

            Filesize

            64KB

          • memory/5088-147-0x00000000003A0000-0x00000000003AC000-memory.dmp

            Filesize

            48KB

          • memory/5088-152-0x0000000002730000-0x00000000027BF000-memory.dmp

            Filesize

            572KB

          • memory/5088-150-0x00000000023E0000-0x000000000272A000-memory.dmp

            Filesize

            3.3MB

          • memory/5088-151-0x0000000000350000-0x000000000037D000-memory.dmp

            Filesize

            180KB

          • memory/5088-149-0x0000000000350000-0x000000000037D000-memory.dmp

            Filesize

            180KB

          • memory/5088-148-0x00000000003A0000-0x00000000003AC000-memory.dmp

            Filesize

            48KB