Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 13:37
Behavioral task
behavioral1
Sample
USD46k Swift_PDF.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
USD46k Swift_PDF.exe
Resource
win10v2004-20240508-en
General
-
Target
USD46k Swift_PDF.exe
-
Size
659KB
-
MD5
b2c97bdc5cdba659fcc2da66d2f80a8f
-
SHA1
812541b4d56efd804b47fdae1630b69433419320
-
SHA256
256194e31f5e3cdd00144320e30165ec54d77de265f5d959b22993b4ce124863
-
SHA512
013abfed445d1d1868a65a9e632759d3c600c3c334cb001f6dd527557667e1bd3e95b07d4d650c8bb83cf5ebe9f8962c9a8be0b53562c880299f0fa7776f865d
-
SSDEEP
12288:AYV6MorX7qzuC3QHO9FQVHPF51jgc1tcpHY+etwlcjM3c0Ib9:fBXu9HGaVHotetwlcuKb9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1724-0-0x0000000000870000-0x00000000009E7000-memory.dmp upx behavioral2/memory/1724-16-0x0000000000870000-0x00000000009E7000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1724-16-0x0000000000870000-0x00000000009E7000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1724 set thread context of 5088 1724 USD46k Swift_PDF.exe 86 PID 5088 set thread context of 3432 5088 svchost.exe 56 PID 5088 set thread context of 2168 5088 svchost.exe 98 PID 2168 set thread context of 3432 2168 setupugc.exe 56 PID 2168 set thread context of 5040 2168 setupugc.exe 100 -
description ioc Process Key created \Registry\User\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 setupugc.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 5088 svchost.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1724 USD46k Swift_PDF.exe 5088 svchost.exe 3432 Explorer.EXE 3432 Explorer.EXE 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe 2168 setupugc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1724 USD46k Swift_PDF.exe 1724 USD46k Swift_PDF.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1724 USD46k Swift_PDF.exe 1724 USD46k Swift_PDF.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1724 wrote to memory of 5088 1724 USD46k Swift_PDF.exe 86 PID 1724 wrote to memory of 5088 1724 USD46k Swift_PDF.exe 86 PID 1724 wrote to memory of 5088 1724 USD46k Swift_PDF.exe 86 PID 1724 wrote to memory of 5088 1724 USD46k Swift_PDF.exe 86 PID 3432 wrote to memory of 2168 3432 Explorer.EXE 98 PID 3432 wrote to memory of 2168 3432 Explorer.EXE 98 PID 3432 wrote to memory of 2168 3432 Explorer.EXE 98 PID 2168 wrote to memory of 5040 2168 setupugc.exe 100 PID 2168 wrote to memory of 5040 2168 setupugc.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\USD46k Swift_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5088
-
-
-
C:\Windows\SysWOW64\setupugc.exe"C:\Windows\SysWOW64\setupugc.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD57f90b70897582470c201796b1f5efa19
SHA1b6619c8dfbc51aba1876eef95def633ac87993c4
SHA2563978af8e0beb0c0a221219a4633d97a06b00726f8b1d8e9405f3c42e4a01d9c8
SHA51209ff14207e239ebddf130292bf6d7fef453e969cf2bf1d2a3ae670e5ebf6e350562a505ee63d4c1bb2c8def34601f1b3dcd5b88f8cf6abdfddab364071b73748