Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
13/11/2023, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
October'23 Statement of Account.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
October'23 Statement of Account.exe
Resource
win10v2004-20231023-en
General
-
Target
October'23 Statement of Account.exe
-
Size
608KB
-
MD5
67a443f6dfc350f6def3680b95c674de
-
SHA1
0f3b4aae9491bba6f729a75b1824717921a8bb80
-
SHA256
97863fc07fc27a0f99a2d434e307d7530364bfc137f8fd36a68674f1eae3533f
-
SHA512
fb03f0070b6e411e318988313423a722650d6993c2ccb1542128a9d3edb220e91945d25d9ef035dd51ac9838f34e9aa794b4ca9a6a1b9c7d1e8832bf556d6c89
-
SSDEEP
12288:x2lvgVn4eGFKe3LUfgJLFZpADKuojTFqVsUenPzNuVW:DnFGn3wfqLFZ86p3PzNus
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2840 fontview.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3068 set thread context of 2448 3068 October'23 Statement of Account.exe 28 PID 2448 set thread context of 1272 2448 RegSvcs.exe 18 PID 2448 set thread context of 2840 2448 RegSvcs.exe 31 PID 2840 set thread context of 1272 2840 fontview.exe 18 -
description ioc Process Key created \Registry\User\S-1-5-21-1154728922-3261336865-3456416385-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 fontview.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 3068 October'23 Statement of Account.exe 3068 October'23 Statement of Account.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2448 RegSvcs.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1272 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2448 RegSvcs.exe 1272 Explorer.EXE 1272 Explorer.EXE 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe 2840 fontview.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 October'23 Statement of Account.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 3068 wrote to memory of 2448 3068 October'23 Statement of Account.exe 28 PID 1272 wrote to memory of 2840 1272 Explorer.EXE 31 PID 1272 wrote to memory of 2840 1272 Explorer.EXE 31 PID 1272 wrote to memory of 2840 1272 Explorer.EXE 31 PID 1272 wrote to memory of 2840 1272 Explorer.EXE 31 PID 2840 wrote to memory of 2240 2840 fontview.exe 34 PID 2840 wrote to memory of 2240 2840 fontview.exe 34 PID 2840 wrote to memory of 2240 2840 fontview.exe 34 PID 2840 wrote to memory of 2240 2840 fontview.exe 34 PID 2840 wrote to memory of 2240 2840 fontview.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\October'23 Statement of Account.exe"C:\Users\Admin\AppData\Local\Temp\October'23 Statement of Account.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2448
-
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\SysWOW64\fontview.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5d113a47c6ac162a76d78c817aeb57755
SHA1f301cea25c2032dd67ffbd21242b209f0ee70ee2
SHA256bae32df8fa24a3e55bcc1591e09918259173f870090e2ae775509edb8b893eb4
SHA512ba64e248ee75fa43cae60c1e0815c512f89eabc140b35aa696d428a3f5d328db04981c0f500b78211bbfd9087ba678328c8ad63ac51249062900693a1d399178
-
Filesize
1.1MB
MD5f55e5766477de5997da50f12c9c74c91
SHA14dc98900a887be95411f07b9e597c57bdc7dbab3
SHA25690be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69
SHA512983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05