Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
Revised Purchase Order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Revised Purchase Order.exe
Resource
win10v2004-20240226-en
General
-
Target
Revised Purchase Order.exe
-
Size
705KB
-
MD5
8c762ec76d202e8e5aeeefae06814bff
-
SHA1
b0008c82f2107bc627d2269f58858c7b0104006d
-
SHA256
7d7e60a0fa22587c8187fd3077934bff0d596aa5c0da1767096ebbeb10a235a1
-
SHA512
f7a6dfca98a6847bf8df390f95c298e06001ad94d28672ba50fa60d5ab48384dedbbfe77c2063cc0135d329881a76a35514dd019d03fda7cf796ff13dfe62be4
-
SSDEEP
12288:nvM2iNlw0HXUxzzRmb/kGTzdIPqBN09jW6qjrRSlo7qyTwDgWMQ8WeikR:U1XP6zcoYdIKN09jW6qxXTOgwJeR
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2664 MuiUnattend.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1544 set thread context of 2884 1544 Revised Purchase Order.exe 28 PID 2884 set thread context of 1260 2884 Revised Purchase Order.exe 21 PID 2884 set thread context of 2664 2884 Revised Purchase Order.exe 31 PID 2664 set thread context of 1260 2664 MuiUnattend.exe 21 -
description ioc Process Key created \Registry\User\S-1-5-21-330940541-141609230-1670313778-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 MuiUnattend.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2664 MuiUnattend.exe 2664 MuiUnattend.exe 2664 MuiUnattend.exe 2664 MuiUnattend.exe 2664 MuiUnattend.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2884 Revised Purchase Order.exe 2884 Revised Purchase Order.exe 2664 MuiUnattend.exe 2664 MuiUnattend.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 1544 wrote to memory of 2884 1544 Revised Purchase Order.exe 28 PID 2884 wrote to memory of 2664 2884 Revised Purchase Order.exe 31 PID 2884 wrote to memory of 2664 2884 Revised Purchase Order.exe 31 PID 2884 wrote to memory of 2664 2884 Revised Purchase Order.exe 31 PID 2884 wrote to memory of 2664 2884 Revised Purchase Order.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Revised Purchase Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\MuiUnattend.exe"C:\Windows\SysWOW64\MuiUnattend.exe"4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2664
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5d113a47c6ac162a76d78c817aeb57755
SHA1f301cea25c2032dd67ffbd21242b209f0ee70ee2
SHA256bae32df8fa24a3e55bcc1591e09918259173f870090e2ae775509edb8b893eb4
SHA512ba64e248ee75fa43cae60c1e0815c512f89eabc140b35aa696d428a3f5d328db04981c0f500b78211bbfd9087ba678328c8ad63ac51249062900693a1d399178
-
Filesize
1.1MB
MD5f55e5766477de5997da50f12c9c74c91
SHA14dc98900a887be95411f07b9e597c57bdc7dbab3
SHA25690be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69
SHA512983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05