Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    158s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 20:08

General

  • Target

    Purchase order.exe

  • Size

    243KB

  • MD5

    2f8ab32cd008d8f7b8c59b4257acc417

  • SHA1

    2b0673eff53c58e036ca0fa270322fd5a9421b34

  • SHA256

    e9ae7232b9f8f855f4a1b5ab446c3b76a0d79493ae22e690b7e449fd9281f6df

  • SHA512

    969fb9e4074d5107863342a2d67181934b748889d9410f9741b937b514ed30a32c7b4c7b811fd32c57630fa94641ca1e86c0615a82b5af6d7d958ee368395654

  • SSDEEP

    6144:LnPdudwD8uaRyfusWm/VAfoxJ8N3mPxielGxpM:LnPdAuaEfia2uU3WxieoxpM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase order.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\giyoa.exe
      "C:\Users\Admin\AppData\Local\Temp\giyoa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\giyoa.exe
        "C:\Users\Admin\AppData\Local\Temp\giyoa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • C:\Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • C:\Users\Admin\AppData\Local\Temp\giyoa.exe

    Filesize

    214KB

    MD5

    981216d841c5bccd74b8355d64ff4e7e

    SHA1

    7dcebf5cce67e1d802cfcb750731abf641cc1bb2

    SHA256

    dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e

    SHA512

    65a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45

  • C:\Users\Admin\AppData\Local\Temp\tvcxswmb.nvq

    Filesize

    127KB

    MD5

    1942ec5d9ba70fb43a6e6dfc59cd45f4

    SHA1

    bd4c9ba82989f3434f62f6b83f677b4fc3e56334

    SHA256

    55bb1abf761d908198ac353c7908ae7377fd9320596c50470928b472b580fd30

    SHA512

    5a38b6ea186ee27503c97aece76f05f8e023e784c46fde23ffb7adf69d706251cd63e8eda5cbbddfc8f5a02b8a11a675a4f5a8693efc9ba06d4e2ff5699b0ff7

  • memory/4012-5-0x0000000001450000-0x0000000001452000-memory.dmp

    Filesize

    8KB

  • memory/4916-18-0x0000000004FF0000-0x0000000005056000-memory.dmp

    Filesize

    408KB

  • memory/4916-20-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4916-10-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4916-11-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4916-13-0x0000000073880000-0x0000000074030000-memory.dmp

    Filesize

    7.7MB

  • memory/4916-14-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4916-15-0x0000000002780000-0x000000000278E000-memory.dmp

    Filesize

    56KB

  • memory/4916-16-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4916-17-0x0000000005530000-0x0000000005AD4000-memory.dmp

    Filesize

    5.6MB

  • memory/4916-7-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4916-19-0x0000000073880000-0x0000000074030000-memory.dmp

    Filesize

    7.7MB

  • memory/4916-9-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4916-21-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4916-22-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4916-23-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4916-24-0x00000000061C0000-0x0000000006252000-memory.dmp

    Filesize

    584KB

  • memory/4916-25-0x00000000065B0000-0x00000000065BA000-memory.dmp

    Filesize

    40KB

  • memory/4916-26-0x00000000068D0000-0x0000000006A92000-memory.dmp

    Filesize

    1.8MB

  • memory/4916-27-0x0000000006FD0000-0x00000000074FC000-memory.dmp

    Filesize

    5.2MB

  • memory/4916-28-0x0000000006800000-0x0000000006826000-memory.dmp

    Filesize

    152KB

  • memory/4916-29-0x0000000006830000-0x0000000006880000-memory.dmp

    Filesize

    320KB

  • memory/4916-30-0x00000000067B0000-0x00000000067C4000-memory.dmp

    Filesize

    80KB

  • memory/4916-31-0x00000000067C0000-0x00000000067CC000-memory.dmp

    Filesize

    48KB