Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
Shipment document.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Shipment document.exe
Resource
win10v2004-20230703-en
General
-
Target
Shipment document.exe
-
Size
664KB
-
MD5
a8cd4eaa803c78d7d60de36ddea14cca
-
SHA1
c5a605e276de95ece9098f8effd28d54aaf41edc
-
SHA256
3a04516d71e6a24f0f20da46230239ca177e6c1d76cb887948344694e2a376a4
-
SHA512
91a063a80bb01cfdc44edd48c8959eed1439709bac69fbab05b3157e5186062cfd8e15752c29812dc0fb8cf21cb1cd2f216b938ac09e7d4ec4c06a5e33969f47
-
SSDEEP
12288:3g7JduIEEnU6ANYZZQkyVy55elgBrjwt1GyR07zjzMxsFleptgRCtQoHb9HBENmC:3g7yIEtpYLQq5omwtQoKz7F+iRCmoxwh
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wSStSI = "C:\\Users\\Admin\\AppData\\Roaming\\wSStSI\\wSStSI.exe" MSBuild.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 api.ipify.org 52 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3968 set thread context of 3464 3968 Shipment document.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3968 Shipment document.exe 3968 Shipment document.exe 3464 MSBuild.exe 3464 MSBuild.exe 5064 powershell.exe 5064 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3968 Shipment document.exe Token: SeDebugPrivilege 3464 MSBuild.exe Token: SeDebugPrivilege 5064 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3968 wrote to memory of 5064 3968 Shipment document.exe 99 PID 3968 wrote to memory of 5064 3968 Shipment document.exe 99 PID 3968 wrote to memory of 5064 3968 Shipment document.exe 99 PID 3968 wrote to memory of 2748 3968 Shipment document.exe 101 PID 3968 wrote to memory of 2748 3968 Shipment document.exe 101 PID 3968 wrote to memory of 2748 3968 Shipment document.exe 101 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103 PID 3968 wrote to memory of 3464 3968 Shipment document.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipment document.exe"C:\Users\Admin\AppData\Local\Temp\Shipment document.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JgThWkWBNlCuk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JgThWkWBNlCuk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1661.tmp"2⤵
- Creates scheduled task(s)
PID:2748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ee2e994306c68a420f2c59cb293ef888
SHA18fe00744c52bcbaffacda7efa38408decbe3d18a
SHA2563d6c793eef58a452228219a6d0c3f79cd0e63183481a2dadfbf6aa5c44ff6f60
SHA5128aa0f1c75b374707eebfddaf0d0fb87fea78758a4d7de5c99ce03c1140bbf2a12cb6061d4344366992e58d70334b864fc3b81c73502fa61d69bea790a053a8ae