Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/07/2023, 09:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20230712-en
5 signatures
150 seconds
General
-
Target
PURCHASE ORDER.exe
-
Size
934KB
-
MD5
687acf4479fbd86277fdf370e9535e85
-
SHA1
87411fc5d13aef29b17d5a54cadb4dbb0245d78e
-
SHA256
e1156b2e6b8500afa5e8a45d46a3420a33be357d5af362a224dc39e253fc720f
-
SHA512
203804252fd845ee662f191e6961869f9aada361d4b1ad4ab493eb616221babbab5a17f58bc1b6f5dd22ef557b3f90cd491006b26730dd1996d7002a0b7320ac
-
SSDEEP
24576:RN6GEf3tyqvbEtsJElhBstN+YDFt9/FGm72BZcHuE:b6hfgOQtMB/Hl8hZcHuE
Malware Config
Extracted
Family
darkcloud
C2
https://api.telegram.org/bot6267068129:AAE4AO_gQGAeEakYl26r7KthrUjdWAdy5c0/sendMessage?chat_id=1909112828
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2476 set thread context of 2164 2476 PURCHASE ORDER.exe 30 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2164 PURCHASE ORDER.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2164 PURCHASE ORDER.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30 PID 2476 wrote to memory of 2164 2476 PURCHASE ORDER.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2164
-