Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2023, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
invoice.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
invoice.exe
Resource
win10v2004-20230621-en
General
-
Target
invoice.exe
-
Size
260KB
-
MD5
49a70f543b8d5c902df2c034e02dfd2d
-
SHA1
f4d99146bad5e5e33a0a1497db81bc8218c484a6
-
SHA256
19c456f77ef7a2c3d34f397ab4d435092281b157a76ab5e5002370a283e40e65
-
SHA512
237e01ea6210359d16910c7c73c3d5cef6c0c874c2c6423e5bfd9359fe582ed4784a8b60063ae55338b0fbfcefd4bf521df205bdaf87b2f04c079d6c4b55f3d4
-
SSDEEP
6144:pYa65nnH1aTNTPh3HzehIVRAETPR/LGNCzJj/kpRU3WZP8TJaD8eLWyw:pYHVaTNTPh3iOqEbdyNsJoPoJrz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Control Panel\International\Geo\Nation invoice.exe -
Loads dropped DLL 1 IoCs
pid Process 952 invoice.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 312 952 invoice.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe 312 invoice.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 952 invoice.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 312 invoice.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 952 wrote to memory of 312 952 invoice.exe 86 PID 952 wrote to memory of 312 952 invoice.exe 86 PID 952 wrote to memory of 312 952 invoice.exe 86 PID 952 wrote to memory of 312 952 invoice.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\invoice.exe"C:\Users\Admin\AppData\Local\Temp\invoice.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5c4672409fca87e9d0e71bedd79ab9029
SHA1a104651cf6df2c443cd89a3cfb5cfd0b8dbf5642
SHA256d12ad8d3de228141708bb1da4522a07279ff455cce6e4574ac4ec7b164bbb02e
SHA512644b07611f88e4d18d5caaa3745d832466cf4a8a0a721a21b57743b35b58d3f768086078b6125c250e74c52c2e873acefddb199959a4ffbf43797c94b4e50f94