Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
Revised invoice.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Revised invoice.exe
Resource
win10v2004-20231023-en
General
-
Target
Revised invoice.exe
-
Size
656KB
-
MD5
20ad07241b54c7690a5914b6069151b2
-
SHA1
b631e2d6910155d57982f27a0cebea4d5695c08b
-
SHA256
9ab77e961ee2eaaee3da8d49b8f9f09444b279c6f258cf8e9769e4a16c22fbd4
-
SHA512
8e851c4230926b9f7751b0ee779802318878fb127a7cbce16240bbf5b38fd4fd0d518b5594ee0d19e1b01420a339525d50abcff23420987ffbd2e590d052eeeb
-
SSDEEP
12288:DODN9e6QLaK0//g91Xp3vjb3SMJeHH6GpP6TitTPuvdXp/Oat:yD3e6QLEWoRHvpPS
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2828 unregmp2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1576 set thread context of 2688 1576 Revised invoice.exe 28 PID 2688 set thread context of 1324 2688 MSBuild.exe 16 PID 2688 set thread context of 2828 2688 MSBuild.exe 31 PID 2828 set thread context of 1324 2828 unregmp2.exe 16 -
description ioc Process Key created \Registry\User\S-1-5-21-2084844033-2744876406-2053742436-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 unregmp2.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1576 Revised invoice.exe 1576 Revised invoice.exe 2688 MSBuild.exe 2688 MSBuild.exe 2688 MSBuild.exe 2688 MSBuild.exe 2688 MSBuild.exe 2688 MSBuild.exe 2688 MSBuild.exe 2688 MSBuild.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1324 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2688 MSBuild.exe 1324 Explorer.EXE 1324 Explorer.EXE 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe 2828 unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1576 Revised invoice.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1576 wrote to memory of 2688 1576 Revised invoice.exe 28 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 1324 wrote to memory of 2828 1324 Explorer.EXE 31 PID 2828 wrote to memory of 2216 2828 unregmp2.exe 34 PID 2828 wrote to memory of 2216 2828 unregmp2.exe 34 PID 2828 wrote to memory of 2216 2828 unregmp2.exe 34 PID 2828 wrote to memory of 2216 2828 unregmp2.exe 34 PID 2828 wrote to memory of 2216 2828 unregmp2.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Revised invoice.exe"C:\Users\Admin\AppData\Local\Temp\Revised invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2688
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\SysWOW64\unregmp2.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
433KB
MD5ecc8ac417181d4885ef8c208d1f073dc
SHA133154e45485bc0ae3bb0203ffcb9baaaed4038d3
SHA256d01c69d09282f9050f6b113c45884fe9b9abf3bdf5bd93b45927d9b6bfb233fe
SHA512f7601763447bed9b7b45fef2bd584da669636d2657c6066516c949e713ce1caf0641a1889345e92e584b84f438fa19029d13c6f6f1583d35fcc1eb3f998631da
-
Filesize
828KB
MD5d5ea9b5814553bd2f9bbb8bf0ea94ed6
SHA129629836c088dcd968efb321832edcbcfaac5b51
SHA2565ea67d6b7f67301ca214af511740f26b9e6cc9e16b2c0ec7bba071d05b9bde78
SHA5126867452995c8354622fe22ce4fb4868d2b9cb28bb31aa60b42f06e494b952f66c427aa66c7af09240954bf55ebcde62d4c7feb9d99e742ea3bc5beb3756a7a1e