Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:08

General

  • Target

    Purchase order.exe

  • Size

    243KB

  • MD5

    2f8ab32cd008d8f7b8c59b4257acc417

  • SHA1

    2b0673eff53c58e036ca0fa270322fd5a9421b34

  • SHA256

    e9ae7232b9f8f855f4a1b5ab446c3b76a0d79493ae22e690b7e449fd9281f6df

  • SHA512

    969fb9e4074d5107863342a2d67181934b748889d9410f9741b937b514ed30a32c7b4c7b811fd32c57630fa94641ca1e86c0615a82b5af6d7d958ee368395654

  • SSDEEP

    6144:LnPdudwD8uaRyfusWm/VAfoxJ8N3mPxielGxpM:LnPdAuaEfia2uU3WxieoxpM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase order.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\giyoa.exe
      "C:\Users\Admin\AppData\Local\Temp\giyoa.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\giyoa.exe
        "C:\Users\Admin\AppData\Local\Temp\giyoa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • C:\Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • C:\Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • C:\Users\Admin\AppData\Local\Temp\tvcxswmb.nvq

    Filesize

    127KB

    MD5

    1942ec5d9ba70fb43a6e6dfc59cd45f4

    SHA1

    bd4c9ba82989f3434f62f6b83f677b4fc3e56334

    SHA256

    55bb1abf761d908198ac353c7908ae7377fd9320596c50470928b472b580fd30

    SHA512

    5a38b6ea186ee27503c97aece76f05f8e023e784c46fde23ffb7adf69d706251cd63e8eda5cbbddfc8f5a02b8a11a675a4f5a8693efc9ba06d4e2ff5699b0ff7

  • \Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • \Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • memory/2732-16-0x00000000744B0000-0x0000000074B9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2732-22-0x0000000001F20000-0x0000000001F46000-memory.dmp

    Filesize

    152KB

  • memory/2732-13-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2732-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2732-25-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

    Filesize

    256KB

  • memory/2732-17-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

    Filesize

    256KB

  • memory/2732-18-0x0000000000210000-0x000000000021E000-memory.dmp

    Filesize

    56KB

  • memory/2732-19-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

    Filesize

    256KB

  • memory/2732-20-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2732-21-0x00000000744B0000-0x0000000074B9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2732-10-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2732-23-0x0000000000650000-0x0000000000664000-memory.dmp

    Filesize

    80KB

  • memory/2732-24-0x0000000001F40000-0x0000000001F4C000-memory.dmp

    Filesize

    48KB

  • memory/3020-6-0x00000000000F0000-0x00000000000F2000-memory.dmp

    Filesize

    8KB