Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2023, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
FedExInvoice013.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FedExInvoice013.exe
Resource
win10v2004-20230220-en
General
-
Target
FedExInvoice013.exe
-
Size
877KB
-
MD5
c2744c4bab87079337e5040cec0c202c
-
SHA1
f9a492ebcd8647eb373e889329a12bc69beca10d
-
SHA256
0663257fdd4fc2ee70895f2d46ed462472c2eb8734bd191ab37df92555276bc3
-
SHA512
b4500903b5d30bdd558f241ac31d2405a966ef3b6444674b3b35d01741402ce08a55deeed0bbd85bbe673491a4d4ce4e7b30608e19f008b309ebc91b448ceabf
-
SSDEEP
12288:OqxiRq8Wzhy7/G5F4MkyzlvMjSp2O28Bu7O1mwlF6jiFOhG4q3N4X5Krg:3iRKhy7/G5GMxt67/m6uJMr
Malware Config
Signatures
-
PredatorStealer
Predator is a modular stealer written in C#.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation FedExInvoice013.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 Zip.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\update_231408.exe / start" FedExInvoice013.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 ip-api.com 72 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 3940 5048 FedExInvoice013.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3940 FedExInvoice013.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3940 FedExInvoice013.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3940 FedExInvoice013.exe Token: SeDebugPrivilege 2956 Zip.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 5048 wrote to memory of 3940 5048 FedExInvoice013.exe 92 PID 3940 wrote to memory of 2956 3940 FedExInvoice013.exe 93 PID 3940 wrote to memory of 2956 3940 FedExInvoice013.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 FedExInvoice013.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"C:\Users\Admin\AppData\Local\Temp\FedExInvoice013.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\Zip.exe"C:\Users\Admin\AppData\Local\Temp\Zip.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5765cff098b629b1eb49e3ef981f7001a
SHA132b7ade1f746d013371141dcebd96e0bb3faeef3
SHA256ee17be860e129795491b4be61f5ac446b16f2679e056114024ffc72b2e23a9b7
SHA512ca2d2ddafc2dcbeab2c93f039bdbc567d4c9e0457e741e71c432b7461a1a8165891f22112ff1b57004ba51271899555fbf001db17d2dc748bafc608817bd9474
-
Filesize
1KB
MD5a0069f5e66bee104f0f4f13da873e0d1
SHA154120eea530d99c973f650d9aaa01dd0925cb20a
SHA256bdb1213fe1648ef523383b19fb81212395578aec6e19fc32811632788b2b1078
SHA5129eab7970525d5eca04e78b576813ea06312c052f247bdc2570b94a6046fb4fc8dac63e793c4448617c726836b81d8fa825191d2d18fe872373af6282a3ee6c43
-
Filesize
1KB
MD5d380396ffac6f39dca047b76405c4720
SHA110aa72868b25d21fc37d4b8bc35837e29d78a8f1
SHA25616b0db9765d48a9731273bf439dbb40c3bd078295151a82039f43dc83662811c
SHA512b9f0651d09e17e2ff1c40799b0ba85a2f4a9fc52431df65a057de96782a8959c41203712735c0d8e4a0e426d94c0400e67558f3983f5b5a558e096ef0746eb55
-
Filesize
427KB
MD5f44bbd50f8dfae5231d70934c29499cb
SHA10b8ba38a30046d385c18a7a261c2290016e76bb5
SHA256905901c676f0546faf3c95037d265d9faaf5d753e20fbb2e5a260dda66b650bd
SHA51202a7b1b860846470fd61ac89d0ed8762e8a7ef4e673400b8ceebf0d2dfc53b4dfd66b1ea4b025762b8fbf1a7ad7e9c111aabd3a9f23c6a09b22cddcb0110851d
-
Filesize
315B
MD56eea27bd00b9add18c4fa4574d727b4b
SHA13b6c250f1b8fcd40408a5aba2c1d4f182e74cdef
SHA256841ff088863727857a1e2d02b741cc3912ca9cb845627b2b920faf86733f3ef5
SHA512adf25862a2038088202aefba5fda878407427c192b5121c7cdfdf69b41f674a5dcc1b84f3a05042a084d2e726504f6e602dd789887ebae69530e308ee95003da
-
Filesize
31KB
MD5af07e88ec22cc90cebfda29517f101b9
SHA1a9e6f4ae24abf76966d7db03af9c802e83760143
SHA2561632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2
SHA512b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc
-
Filesize
31KB
MD5af07e88ec22cc90cebfda29517f101b9
SHA1a9e6f4ae24abf76966d7db03af9c802e83760143
SHA2561632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2
SHA512b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc
-
Filesize
31KB
MD5af07e88ec22cc90cebfda29517f101b9
SHA1a9e6f4ae24abf76966d7db03af9c802e83760143
SHA2561632fbff8edc50f2c7ef7bb2fe9b2c17e6472094f0d365a98e0dec2a12fa8ec2
SHA512b4575af98071fc8d46c022e24bfb2c1567d7e5f3de0d8fb5fee6f876985c7780a5b145f645725ff27a15367162aa08490ac2f8dd59d705663094fe4e1eeec7bc