Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 10:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Revised invoice.exe
Resource
win7-20231020-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Revised invoice.exe
Resource
win10v2004-20231023-en
7 signatures
150 seconds
General
-
Target
Revised invoice.exe
-
Size
656KB
-
MD5
20ad07241b54c7690a5914b6069151b2
-
SHA1
b631e2d6910155d57982f27a0cebea4d5695c08b
-
SHA256
9ab77e961ee2eaaee3da8d49b8f9f09444b279c6f258cf8e9769e4a16c22fbd4
-
SHA512
8e851c4230926b9f7751b0ee779802318878fb127a7cbce16240bbf5b38fd4fd0d518b5594ee0d19e1b01420a339525d50abcff23420987ffbd2e590d052eeeb
-
SSDEEP
12288:DODN9e6QLaK0//g91Xp3vjb3SMJeHH6GpP6TitTPuvdXp/Oat:yD3e6QLEWoRHvpPS
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4692 set thread context of 4868 4692 Revised invoice.exe 100 PID 4868 set thread context of 3324 4868 MSBuild.exe 46 PID 4868 set thread context of 1392 4868 MSBuild.exe 104 PID 1392 set thread context of 852 1392 unregmp2.exe 105 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4692 Revised invoice.exe 4692 Revised invoice.exe 4692 Revised invoice.exe 4692 Revised invoice.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 4868 MSBuild.exe 1392 unregmp2.exe 1392 unregmp2.exe 1392 unregmp2.exe 1392 unregmp2.exe 1392 unregmp2.exe 1392 unregmp2.exe 1392 unregmp2.exe 1392 unregmp2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3324 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4868 MSBuild.exe 4868 MSBuild.exe 1392 unregmp2.exe 1392 unregmp2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4692 Revised invoice.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3324 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1248 4692 Revised invoice.exe 99 PID 4692 wrote to memory of 1248 4692 Revised invoice.exe 99 PID 4692 wrote to memory of 1248 4692 Revised invoice.exe 99 PID 4692 wrote to memory of 4868 4692 Revised invoice.exe 100 PID 4692 wrote to memory of 4868 4692 Revised invoice.exe 100 PID 4692 wrote to memory of 4868 4692 Revised invoice.exe 100 PID 4692 wrote to memory of 4868 4692 Revised invoice.exe 100 PID 4692 wrote to memory of 4868 4692 Revised invoice.exe 100 PID 4692 wrote to memory of 4868 4692 Revised invoice.exe 100 PID 3324 wrote to memory of 852 3324 Explorer.EXE 105 PID 3324 wrote to memory of 852 3324 Explorer.EXE 105 PID 3324 wrote to memory of 852 3324 Explorer.EXE 105 PID 4868 wrote to memory of 1392 4868 MSBuild.exe 104 PID 4868 wrote to memory of 1392 4868 MSBuild.exe 104 PID 4868 wrote to memory of 1392 4868 MSBuild.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Revised invoice.exe"C:\Users\Admin\AppData\Local\Temp\Revised invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\SysWOW64\unregmp2.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1392
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\SysWOW64\unregmp2.exe"2⤵PID:852
-