Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/04/2023, 13:37

General

  • Target

    ORDER SPEC.scr

  • Size

    2.7MB

  • MD5

    6d5c38d39f2e653c9954f44bc113b9fb

  • SHA1

    fa3aa47590e4aaac3c656b4fe114c6f56b76ba20

  • SHA256

    dccdd805ab3a1f31780ce46912cce1356dc12084e46e31aa6208052ddcd95054

  • SHA512

    c60c31be41343b410d66e78be6b59f9c818b216e380023453ff45571f90de68acbb27c76f3f164965b860f70ddbd12e890f2a82f429f19edc24a5e2d8ce32176

  • SSDEEP

    49152:20SnnC+BsY/8q7+gbf+qjw98xyDNGTQmSPcFP9+o:20

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER SPEC.scr
    "C:\Users\Admin\AppData\Local\Temp\ORDER SPEC.scr" /S
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3904
    • C:\Users\Admin\AppData\Local\Temp\ORDER SPEC.scr
      "C:\Users\Admin\AppData\Local\Temp\ORDER SPEC.scr"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ORDER SPEC.scr.log

    Filesize

    1KB

    MD5

    cbe207895aa962105ca913568f7d2135

    SHA1

    c62bcc9aac6f6ad0b14457d3d51c0a474528b106

    SHA256

    bd468d112dd92eab9177b172cb46016d96c6d85fe567734852f8c07733c14a24

    SHA512

    3a93a75b1c3a93d8466a7b2f5b0433805d7055e829834203b3b6ae48ecb899f3aaf68610057a0ce0f9a29647cd7c6577dcb4c89124dc368e91f5866a5dbf1e44

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2cmjq3k4.kzk.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2708-148-0x000001EF1D120000-0x000001EF1D130000-memory.dmp

    Filesize

    64KB

  • memory/2708-134-0x000001EF1D230000-0x000001EF1D252000-memory.dmp

    Filesize

    136KB

  • memory/2708-135-0x000001EF1D120000-0x000001EF1D130000-memory.dmp

    Filesize

    64KB

  • memory/2708-133-0x000001EF1B160000-0x000001EF1B424000-memory.dmp

    Filesize

    2.8MB

  • memory/3684-179-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-185-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-2503-0x00000234EBB50000-0x00000234EBB60000-memory.dmp

    Filesize

    64KB

  • memory/3684-2502-0x00000234EBB50000-0x00000234EBB60000-memory.dmp

    Filesize

    64KB

  • memory/3684-154-0x0000000000400000-0x00000000004C6000-memory.dmp

    Filesize

    792KB

  • memory/3684-2501-0x00000234EBB50000-0x00000234EBB60000-memory.dmp

    Filesize

    64KB

  • memory/3684-157-0x00000234EBB50000-0x00000234EBB60000-memory.dmp

    Filesize

    64KB

  • memory/3684-158-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-159-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-161-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-163-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-165-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-167-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-169-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-171-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-173-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-175-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-177-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-1829-0x00000234EBB50000-0x00000234EBB60000-memory.dmp

    Filesize

    64KB

  • memory/3684-181-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-183-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-219-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-187-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-189-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-191-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-193-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-195-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-197-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-199-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-201-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-203-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-205-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-207-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-209-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-211-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-213-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-215-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3684-217-0x00000234EBB60000-0x00000234EBC58000-memory.dmp

    Filesize

    992KB

  • memory/3904-147-0x0000019E44960000-0x0000019E44970000-memory.dmp

    Filesize

    64KB

  • memory/3904-145-0x0000019E44960000-0x0000019E44970000-memory.dmp

    Filesize

    64KB

  • memory/3904-146-0x0000019E44960000-0x0000019E44970000-memory.dmp

    Filesize

    64KB

  • memory/3904-150-0x0000019E44960000-0x0000019E44970000-memory.dmp

    Filesize

    64KB

  • memory/3904-149-0x0000019E44960000-0x0000019E44970000-memory.dmp

    Filesize

    64KB