Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2023, 11:09

General

  • Target

    Purchase order.exe

  • Size

    663KB

  • MD5

    2066bebe7c32cf52b2e7e5b2ae6dcf5b

  • SHA1

    acc4a396e69d6bb6de3791d8cda944d899f524e8

  • SHA256

    20ca9236b9070c02ddedeed75c4b5b478a06f31c9a3d714105503a17595e386f

  • SHA512

    2394649c626df36f6f2d4c4348cacda22e019f936268c90197ff5b182ab7d6b71dff5d5305f611ede3fa19d0dda7a072e44e3ecf985c3f761e15d5e1aed7de5e

  • SSDEEP

    12288:Og7Jh13m+oB7VDW5pJN89HCpxHEM8XGysZrPBVr3UoKl:Og7tW+oBJD6prbEN6JNy

Score
7/10

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase order.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Users\Admin\AppData\Local\Temp\Purchase order.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase order.exe.log

    Filesize

    1KB

    MD5

    8783efc818e6c4b08cdd7dc7e06641d0

    SHA1

    481a410d390aefdd28ff1bc005d1ee46e7b092f2

    SHA256

    735a7e96c6b2d91b062f378d14291656b72c92d36b1a21584ce5b606b4ea8572

    SHA512

    1d48c97192d9ca4deca93a2a62dc6230d2752b1710c95660b41e89413b9b022a0139570d946580968bd04cf48497a6dc31e25d4aca7f477525b346ab0a302d32

  • memory/1836-144-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1836-153-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/1836-152-0x0000000074AB0000-0x0000000075260000-memory.dmp

    Filesize

    7.7MB

  • memory/1836-151-0x0000000006700000-0x0000000006750000-memory.dmp

    Filesize

    320KB

  • memory/1836-150-0x0000000004F10000-0x0000000004F76000-memory.dmp

    Filesize

    408KB

  • memory/1836-149-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/1836-147-0x0000000074AB0000-0x0000000075260000-memory.dmp

    Filesize

    7.7MB

  • memory/4252-138-0x0000000004F40000-0x0000000004F4A000-memory.dmp

    Filesize

    40KB

  • memory/4252-142-0x00000000051E0000-0x00000000051F0000-memory.dmp

    Filesize

    64KB

  • memory/4252-143-0x000000000A5C0000-0x000000000A65C000-memory.dmp

    Filesize

    624KB

  • memory/4252-141-0x0000000074AB0000-0x0000000075260000-memory.dmp

    Filesize

    7.7MB

  • memory/4252-140-0x0000000006900000-0x0000000006922000-memory.dmp

    Filesize

    136KB

  • memory/4252-139-0x00000000068E0000-0x00000000068F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-148-0x0000000074AB0000-0x0000000075260000-memory.dmp

    Filesize

    7.7MB

  • memory/4252-133-0x0000000074AB0000-0x0000000075260000-memory.dmp

    Filesize

    7.7MB

  • memory/4252-137-0x00000000051E0000-0x00000000051F0000-memory.dmp

    Filesize

    64KB

  • memory/4252-136-0x0000000004F50000-0x0000000004FE2000-memory.dmp

    Filesize

    584KB

  • memory/4252-135-0x0000000005460000-0x0000000005A04000-memory.dmp

    Filesize

    5.6MB

  • memory/4252-134-0x00000000004A0000-0x000000000054C000-memory.dmp

    Filesize

    688KB