Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
Maersk_Quotation.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Maersk_Quotation.exe
Resource
win10v2004-20240426-en
General
-
Target
Maersk_Quotation.exe
-
Size
819KB
-
MD5
5f5b4b7694a47e5daf2ea45203e7f410
-
SHA1
30a5afcab27746c6d30755cc09baeffd082cb7a1
-
SHA256
fdf6769af86db361b56a4bc21862caa4c4f3c68f6b2fc1503735219db3727125
-
SHA512
509526a425296735edf273aabc8f0a3bc2762ff436778ba4c7393a4de6a86ea7be79a5297703b5edde2693653875767a3982a3d3f7d451c624f94bf41749a3c3
-
SSDEEP
24576:3y7C3c63oT1B7w7v621X84uLZuhxkr01gtY+VTjC:360oRZwGkuohxkr4gtY+VTj
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4492 powershell.exe 1308 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Maersk_Quotation.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4116 set thread context of 3100 4116 Maersk_Quotation.exe 97 PID 3100 set thread context of 3424 3100 Maersk_Quotation.exe 56 PID 3100 set thread context of 3836 3100 Maersk_Quotation.exe 99 PID 3836 set thread context of 3424 3836 relog.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 4116 Maersk_Quotation.exe 4116 Maersk_Quotation.exe 4116 Maersk_Quotation.exe 4116 Maersk_Quotation.exe 4116 Maersk_Quotation.exe 4116 Maersk_Quotation.exe 4492 powershell.exe 1308 powershell.exe 4116 Maersk_Quotation.exe 4492 powershell.exe 1308 powershell.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3100 Maersk_Quotation.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe 3836 relog.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3100 Maersk_Quotation.exe 3424 Explorer.EXE 3424 Explorer.EXE 3836 relog.exe 3836 relog.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4116 Maersk_Quotation.exe Token: SeDebugPrivilege 4492 powershell.exe Token: SeDebugPrivilege 1308 powershell.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3424 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4492 4116 Maersk_Quotation.exe 91 PID 4116 wrote to memory of 4492 4116 Maersk_Quotation.exe 91 PID 4116 wrote to memory of 4492 4116 Maersk_Quotation.exe 91 PID 4116 wrote to memory of 1308 4116 Maersk_Quotation.exe 93 PID 4116 wrote to memory of 1308 4116 Maersk_Quotation.exe 93 PID 4116 wrote to memory of 1308 4116 Maersk_Quotation.exe 93 PID 4116 wrote to memory of 4360 4116 Maersk_Quotation.exe 95 PID 4116 wrote to memory of 4360 4116 Maersk_Quotation.exe 95 PID 4116 wrote to memory of 4360 4116 Maersk_Quotation.exe 95 PID 4116 wrote to memory of 3100 4116 Maersk_Quotation.exe 97 PID 4116 wrote to memory of 3100 4116 Maersk_Quotation.exe 97 PID 4116 wrote to memory of 3100 4116 Maersk_Quotation.exe 97 PID 4116 wrote to memory of 3100 4116 Maersk_Quotation.exe 97 PID 4116 wrote to memory of 3100 4116 Maersk_Quotation.exe 97 PID 4116 wrote to memory of 3100 4116 Maersk_Quotation.exe 97 PID 3424 wrote to memory of 3836 3424 Explorer.EXE 99 PID 3424 wrote to memory of 3836 3424 Explorer.EXE 99 PID 3424 wrote to memory of 3836 3424 Explorer.EXE 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Maersk_Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Maersk_Quotation.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Maersk_Quotation.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\fCSnuHiYBS.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fCSnuHiYBS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9395.tmp"3⤵
- Creates scheduled task(s)
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\Maersk_Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Maersk_Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3100
-
-
-
C:\Windows\SysWOW64\relog.exe"C:\Windows\SysWOW64\relog.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD563d4f0d57445cd76ada6de71bbc3b459
SHA19cd93d4394ce9a7acde7a62afd8ffa10198308a1
SHA2563d4385e2ccd5c3240d1b7b4b47ee1616b5b92d87af53257c2a9289743426658b
SHA512b4574821446a3f9d63382c7e64a8c176005fc2a55494d3050ad8c17b9876e3435ea042aef58785e2154a89c2ed6071c9450fb44b6c8d3d7fc614a1dd8ae56bcf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD594ded0dc97abd7773c0a6e9c05eb9fe2
SHA179430f474c8399b8746242abe8eba862b0393e29
SHA256c61b3f539040b2e5a266f00a17ab548fe7fda4adf62051aa71a1af37a554d71c
SHA512832f90e02c540ed2ed9e2f9e3ecc6bed25fbe8c906b06bad48edf0ae976684bca8b00823254e71573557b5fa8fce73044500ecb246d337bbd85b6195983513cf