Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2023, 10:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Payment Advise 201223 pdf.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payment Advise 201223 pdf.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
Payment Advise 201223 pdf.exe
-
Size
951KB
-
MD5
43e62f55ca87bca9958904980c6a739e
-
SHA1
8049cf6db6349ce872022bf7c25ecc392946fc65
-
SHA256
860a1dfc03c5420e2fc343a66434075b286deb3ecb03134486d24c18ef60687d
-
SHA512
62471d5d804a8a807d69e0db7b298ae785d7036e165ba6e0d09d50fce6aa7719e36d1f81c3f139a254c7e4dc55e2b36b5ba6e0c38b380be586ad646b59adda97
-
SSDEEP
12288:LyXbgBFhPQN39BnbG5WKb6M8rePfIs7ReZei:KgBFyJfnq5WKb6M8reoIReZ9
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 412 set thread context of 3888 412 Payment Advise 201223 pdf.exe 95 PID 3888 set thread context of 3408 3888 Payment Advise 201223 pdf.exe 57 PID 3888 set thread context of 1428 3888 Payment Advise 201223 pdf.exe 99 PID 1428 set thread context of 3408 1428 mcbuilder.exe 57 -
description ioc Process Key created \Registry\User\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mcbuilder.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 412 Payment Advise 201223 pdf.exe 412 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 3888 Payment Advise 201223 pdf.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3888 Payment Advise 201223 pdf.exe 3408 Explorer.EXE 3408 Explorer.EXE 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe 1428 mcbuilder.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 412 Payment Advise 201223 pdf.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3408 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 412 wrote to memory of 3888 412 Payment Advise 201223 pdf.exe 95 PID 412 wrote to memory of 3888 412 Payment Advise 201223 pdf.exe 95 PID 412 wrote to memory of 3888 412 Payment Advise 201223 pdf.exe 95 PID 412 wrote to memory of 3888 412 Payment Advise 201223 pdf.exe 95 PID 412 wrote to memory of 3888 412 Payment Advise 201223 pdf.exe 95 PID 412 wrote to memory of 3888 412 Payment Advise 201223 pdf.exe 95 PID 3408 wrote to memory of 1428 3408 Explorer.EXE 99 PID 3408 wrote to memory of 1428 3408 Explorer.EXE 99 PID 3408 wrote to memory of 1428 3408 Explorer.EXE 99 PID 1428 wrote to memory of 4368 1428 mcbuilder.exe 100 PID 1428 wrote to memory of 4368 1428 mcbuilder.exe 100 PID 1428 wrote to memory of 4368 1428 mcbuilder.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\Payment Advise 201223 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise 201223 pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Payment Advise 201223 pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Advise 201223 pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3888
-
-
-
C:\Windows\SysWOW64\mcbuilder.exe"C:\Windows\SysWOW64\mcbuilder.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4368
-
-