Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
Order Quotation.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Order Quotation.exe
Resource
win10v2004-20230703-en
General
-
Target
Order Quotation.exe
-
Size
328KB
-
MD5
8933001b2016741520a7b3634bbee9b5
-
SHA1
872b493fbfcbfc53399a59fde354200e68988a66
-
SHA256
f35af82ca51d0a71780cfd0a71b6353e57b11f97d8a56615058dd512df91f1f2
-
SHA512
7ef44942a4b9d1160c170d7d6db49028a3c33bfcea4b1ae2288711b0bec91f20d2b3172635041d9624ef25c6cf5875a48ec2ad6f5e2fe48179731797b436421b
-
SSDEEP
6144:mYa6m2DqJ7qQ//AZjTa/bVd6zeWpmivMXYMikvPXCQLkIS3:mYIBqQg9aBMzXpmUM7qQLp6
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4876 Order Quotation.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4876 set thread context of 3540 4876 Order Quotation.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe 3540 Order Quotation.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4876 Order Quotation.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3540 Order Quotation.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3540 4876 Order Quotation.exe 82 PID 4876 wrote to memory of 3540 4876 Order Quotation.exe 82 PID 4876 wrote to memory of 3540 4876 Order Quotation.exe 82 PID 4876 wrote to memory of 3540 4876 Order Quotation.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Order Quotation.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\Order Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Order Quotation.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5ed89bb6f338887301b62ecb7b4d5aa58
SHA17b8950568af0cc234d06f1573dde8fc87331344d
SHA256e6a3e946896a6389c7b771fd6094527b6f14784aad3820b31ca7f7145b95220d
SHA512353d2754e8b25fcbb9c4abcd1f25e69184d8bd0abb3d6dfcbd366b486c27ba2fcdb56acf5f4fd1d2e7db0e4ff36152a8b6507028dff30b062ea39155e6046870