Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
rSHIPMENTGEORGI.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
rSHIPMENTGEORGI.exe
Resource
win10v2004-20230220-en
General
-
Target
rSHIPMENTGEORGI.exe
-
Size
252KB
-
MD5
415c5beaaff6543a0f5559bc10789f36
-
SHA1
faca3834ce2516d6a43a2c9a154fa9a0a50674c2
-
SHA256
235d7cb7d2d35ad991f67311975965620376148951b68725519f723e6a795610
-
SHA512
c9e82197dacb6049a1f33370df7e6d9f53a123a2620bb08e9cc5b3946f55eeb50c9305f8cd7d4d7b6af4d218ff0577f99549bab442718b7d2beb7ecdd19bffe1
-
SSDEEP
6144:vYa66lYhg1lRNQvOzZZPR6TOA10XBeeoxE4nG3J8KdmeGon:vYMlYhWlRNQv0RgR814nG3J8KDd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation rSHIPMENTGEORGI.exe -
Loads dropped DLL 2 IoCs
pid Process 1736 rSHIPMENTGEORGI.exe 1168 wininit.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1736 set thread context of 1712 1736 rSHIPMENTGEORGI.exe 28 PID 1712 set thread context of 1204 1712 rSHIPMENTGEORGI.exe 16 PID 1168 set thread context of 1204 1168 wininit.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3499517378-2376672570-1134980332-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wininit.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1712 rSHIPMENTGEORGI.exe 1712 rSHIPMENTGEORGI.exe 1712 rSHIPMENTGEORGI.exe 1712 rSHIPMENTGEORGI.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1736 rSHIPMENTGEORGI.exe 1712 rSHIPMENTGEORGI.exe 1712 rSHIPMENTGEORGI.exe 1712 rSHIPMENTGEORGI.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe 1168 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1712 rSHIPMENTGEORGI.exe Token: SeDebugPrivilege 1168 wininit.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1712 1736 rSHIPMENTGEORGI.exe 28 PID 1736 wrote to memory of 1712 1736 rSHIPMENTGEORGI.exe 28 PID 1736 wrote to memory of 1712 1736 rSHIPMENTGEORGI.exe 28 PID 1736 wrote to memory of 1712 1736 rSHIPMENTGEORGI.exe 28 PID 1736 wrote to memory of 1712 1736 rSHIPMENTGEORGI.exe 28 PID 1204 wrote to memory of 1168 1204 Explorer.EXE 29 PID 1204 wrote to memory of 1168 1204 Explorer.EXE 29 PID 1204 wrote to memory of 1168 1204 Explorer.EXE 29 PID 1204 wrote to memory of 1168 1204 Explorer.EXE 29 PID 1168 wrote to memory of 980 1168 wininit.exe 32 PID 1168 wrote to memory of 980 1168 wininit.exe 32 PID 1168 wrote to memory of 980 1168 wininit.exe 32 PID 1168 wrote to memory of 980 1168 wininit.exe 32 PID 1168 wrote to memory of 980 1168 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\rSHIPMENTGEORGI.exe"C:\Users\Admin\AppData\Local\Temp\rSHIPMENTGEORGI.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\rSHIPMENTGEORGI.exe"C:\Users\Admin\AppData\Local\Temp\rSHIPMENTGEORGI.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5d113a47c6ac162a76d78c817aeb57755
SHA1f301cea25c2032dd67ffbd21242b209f0ee70ee2
SHA256bae32df8fa24a3e55bcc1591e09918259173f870090e2ae775509edb8b893eb4
SHA512ba64e248ee75fa43cae60c1e0815c512f89eabc140b35aa696d428a3f5d328db04981c0f500b78211bbfd9087ba678328c8ad63ac51249062900693a1d399178
-
Filesize
12KB
MD5e60f77c9a09bf7016a9ea889e292092d
SHA1cd7e4f3db2bcffadf2a296146ed7501297b16105
SHA2567c7060101ff18d4ff569877cf22065015484efffe614fbc2017a867599df9978
SHA51222d863c0032c0ac372b15af5ec0199332d6c7bc6b113be1b50099d4b8d56f584c13fde54b449a93052056811a2d6c655a638c5d2e4b3a294e367f1469890efd6
-
Filesize
12KB
MD5e60f77c9a09bf7016a9ea889e292092d
SHA1cd7e4f3db2bcffadf2a296146ed7501297b16105
SHA2567c7060101ff18d4ff569877cf22065015484efffe614fbc2017a867599df9978
SHA51222d863c0032c0ac372b15af5ec0199332d6c7bc6b113be1b50099d4b8d56f584c13fde54b449a93052056811a2d6c655a638c5d2e4b3a294e367f1469890efd6
-
Filesize
1.1MB
MD5f55e5766477de5997da50f12c9c74c91
SHA14dc98900a887be95411f07b9e597c57bdc7dbab3
SHA25690be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69
SHA512983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05