Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20230831-en
General
-
Target
Purchase order.exe
-
Size
243KB
-
MD5
2f8ab32cd008d8f7b8c59b4257acc417
-
SHA1
2b0673eff53c58e036ca0fa270322fd5a9421b34
-
SHA256
e9ae7232b9f8f855f4a1b5ab446c3b76a0d79493ae22e690b7e449fd9281f6df
-
SHA512
969fb9e4074d5107863342a2d67181934b748889d9410f9741b937b514ed30a32c7b4c7b811fd32c57630fa94641ca1e86c0615a82b5af6d7d958ee368395654
-
SSDEEP
6144:LnPdudwD8uaRyfusWm/VAfoxJ8N3mPxielGxpM:LnPdAuaEfia2uU3WxieoxpM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4012 giyoa.exe 4916 giyoa.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4012 set thread context of 4916 4012 giyoa.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4916 giyoa.exe 4916 giyoa.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4012 giyoa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4916 giyoa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 giyoa.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4012 2056 Purchase order.exe 88 PID 2056 wrote to memory of 4012 2056 Purchase order.exe 88 PID 2056 wrote to memory of 4012 2056 Purchase order.exe 88 PID 4012 wrote to memory of 4916 4012 giyoa.exe 91 PID 4012 wrote to memory of 4916 4012 giyoa.exe 91 PID 4012 wrote to memory of 4916 4012 giyoa.exe 91 PID 4012 wrote to memory of 4916 4012 giyoa.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\giyoa.exe"C:\Users\Admin\AppData\Local\Temp\giyoa.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\giyoa.exe"C:\Users\Admin\AppData\Local\Temp\giyoa.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5981216d841c5bccd74b8355d64ff4e7e
SHA17dcebf5cce67e1d802cfcb750731abf641cc1bb2
SHA256dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e
SHA51265a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45
-
Filesize
214KB
MD5981216d841c5bccd74b8355d64ff4e7e
SHA17dcebf5cce67e1d802cfcb750731abf641cc1bb2
SHA256dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e
SHA51265a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45
-
Filesize
214KB
MD5981216d841c5bccd74b8355d64ff4e7e
SHA17dcebf5cce67e1d802cfcb750731abf641cc1bb2
SHA256dc2ae0646daeaa4f714a483998400eae7f0ae38a059ffe2514639e5870535d3e
SHA51265a10ad525410ba71f0765cee042994036b7d322838a8b0f97046a172df864abb89138320c14f2f8c02ae3b9a4dab149a9076c92e1ebc6fb79fe13cc92481a45
-
Filesize
127KB
MD51942ec5d9ba70fb43a6e6dfc59cd45f4
SHA1bd4c9ba82989f3434f62f6b83f677b4fc3e56334
SHA25655bb1abf761d908198ac353c7908ae7377fd9320596c50470928b472b580fd30
SHA5125a38b6ea186ee27503c97aece76f05f8e023e784c46fde23ffb7adf69d706251cd63e8eda5cbbddfc8f5a02b8a11a675a4f5a8693efc9ba06d4e2ff5699b0ff7