Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
Payment invoice.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payment invoice.exe
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
Payment invoice.exe
-
Size
699KB
-
MD5
7d2dffc850ea555d40c45f09570475c7
-
SHA1
6cc0693502bc8caefcde997e260b0798b4fbde1e
-
SHA256
aa6aaa2be3d8cc64ad42be11e2cd924bddf7bdb46780ec3bc2b8ac2032c3ad89
-
SHA512
1e2036443166fea107ba4aab7ea4a5b991761c00d2b8e55ca17cb44fa06e9fbe09fb2c18979034af20be6f2d15c62880bcfcf8854b746080cc827e89a52ef865
-
SSDEEP
12288:6e37i8LkpEaIptKciGsJn4k4k0sa+NU89WJGTxUQvPCQv1ZdI7n0xRviwkR:6AOjEzpsrJ4kVh99WkUQvqQNZS0xRA
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4844 set thread context of 3884 4844 Payment invoice.exe 98 PID 3884 set thread context of 3540 3884 RegSvcs.exe 56 PID 3884 set thread context of 4104 3884 RegSvcs.exe 102 PID 4104 set thread context of 3540 4104 iexpress.exe 56 PID 4104 set thread context of 4568 4104 iexpress.exe 110 -
description ioc Process Key created \Registry\User\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 iexpress.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4844 Payment invoice.exe 4844 Payment invoice.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 3884 RegSvcs.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3884 RegSvcs.exe 3540 Explorer.EXE 3540 Explorer.EXE 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe 4104 iexpress.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4844 Payment invoice.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3540 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3884 4844 Payment invoice.exe 98 PID 4844 wrote to memory of 3884 4844 Payment invoice.exe 98 PID 4844 wrote to memory of 3884 4844 Payment invoice.exe 98 PID 4844 wrote to memory of 3884 4844 Payment invoice.exe 98 PID 4844 wrote to memory of 3884 4844 Payment invoice.exe 98 PID 4844 wrote to memory of 3884 4844 Payment invoice.exe 98 PID 3540 wrote to memory of 4104 3540 Explorer.EXE 102 PID 3540 wrote to memory of 4104 3540 Explorer.EXE 102 PID 3540 wrote to memory of 4104 3540 Explorer.EXE 102 PID 4104 wrote to memory of 4568 4104 iexpress.exe 110 PID 4104 wrote to memory of 4568 4104 iexpress.exe 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Payment invoice.exe"C:\Users\Admin\AppData\Local\Temp\Payment invoice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3884
-
-
-
C:\Windows\SysWOW64\iexpress.exe"C:\Windows\SysWOW64\iexpress.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4568
-
-