Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
5Dropped Ma...2f.exe
windows11-21h2-x64
Dropped Malware/1.exe
windows11-21h2-x64
Dropped Ma...29.exe
windows11-21h2-x64
10Dropped Ma...89.xls
windows11-21h2-x64
1Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...er.exe
windows11-21h2-x64
10Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...00.exe
windows11-21h2-x64
7Dropped Ma...DF.bat
windows11-21h2-x64
8Dropped Ma...61.exe
windows11-21h2-x64
10Dropped Ma...df.exe
windows11-21h2-x64
10Dropped Ma...89.xls
windows11-21h2-x64
1Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...df.exe
windows11-21h2-x64
5Dropped Ma...00.vbs
windows11-21h2-x64
8Dropped Ma...df.exe
windows11-21h2-x64
8Dropped Ma...B).vbs
windows11-21h2-x64
10Dropped Ma...df.exe
windows11-21h2-x64
3Analysis
-
max time kernel
208s -
max time network
281s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/07/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
Dropped Malware/01622664c6bf1a51484157d73fb4a42f.exe
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
Dropped Malware/1.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
Dropped Malware/BNP DOC 12578945329763-7633562829.exe
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
Dropped Malware/Comprobante de pago_978989689.xls
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Dropped Malware/Document BT24·pdf.exe
Resource
win11-20240611-en
Behavioral task
behavioral6
Sample
Dropped Malware/Jailkeeper.exe
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
Dropped Malware/LHDNM TAKSIRAN 2023·pdf.exe
Resource
win11-20240611-en
Behavioral task
behavioral8
Sample
Dropped Malware/Order 000293884849900.exe
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
Dropped Malware/PO 903886563 PDF.bat
Resource
win11-20240611-en
Behavioral task
behavioral10
Sample
Dropped Malware/PO2024-0961.exe
Resource
win11-20240508-en
Behavioral task
behavioral11
Sample
Dropped Malware/PRODUCTS LIST pdf.exe
Resource
win11-20240508-en
Behavioral task
behavioral12
Sample
Dropped Malware/Product Inquiry466789.xls
Resource
win11-20240611-en
Behavioral task
behavioral13
Sample
Dropped Malware/Quote Request (Tupy S.A.) 523AM - 924BR·pdf.exe
Resource
win11-20240508-en
Behavioral task
behavioral14
Sample
Dropped Malware/REQUEST FOR QUOTATION_pdf.exe
Resource
win11-20240419-en
Behavioral task
behavioral15
Sample
Dropped Malware/Transaction_Execution_Confirmation_000000.vbs
Resource
win11-20240508-en
Behavioral task
behavioral16
Sample
Dropped Malware/faktura_7171503997·pdf.exe
Resource
win11-20240611-en
Behavioral task
behavioral17
Sample
Dropped Malware/ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbs
Resource
win11-20240611-en
Behavioral task
behavioral18
Sample
Dropped Malware/帳單發票_200548224648·pdf.exe
Resource
win11-20240611-en
General
-
Target
Dropped Malware/REQUEST FOR QUOTATION_pdf.exe
-
Size
1.1MB
-
MD5
8f72ae5c3e68e643690aea36735a95bd
-
SHA1
ed901f56acd0fdf9acf586ee84cd22469a92c285
-
SHA256
e3f20d09ed34a08bc3a8c6ebf4bceb079c24229e8b7765a2e679a0ee4a6df28a
-
SHA512
aee44099bb33d6a628221dcd1feb11ad537aa3d9ed76643368cd915758c8bad68e533b4b3a406c0b82b72ca0ee47ffc229dab849461eb473e2176f0b30894308
-
SSDEEP
24576:5AHnh+eWsN3skA4RV1Hom2KXMmHaWQ7JttVeq4RqULd9DEEC/oWb5:Ah+ZkldoPK8YaWQ7J554FHao6
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4148 set thread context of 4296 4148 REQUEST FOR QUOTATION_pdf.exe 76 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe 4296 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4148 REQUEST FOR QUOTATION_pdf.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4148 REQUEST FOR QUOTATION_pdf.exe 4148 REQUEST FOR QUOTATION_pdf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4148 REQUEST FOR QUOTATION_pdf.exe 4148 REQUEST FOR QUOTATION_pdf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4296 4148 REQUEST FOR QUOTATION_pdf.exe 76 PID 4148 wrote to memory of 4296 4148 REQUEST FOR QUOTATION_pdf.exe 76 PID 4148 wrote to memory of 4296 4148 REQUEST FOR QUOTATION_pdf.exe 76 PID 4148 wrote to memory of 4296 4148 REQUEST FOR QUOTATION_pdf.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dropped Malware\REQUEST FOR QUOTATION_pdf.exe"C:\Users\Admin\AppData\Local\Temp\Dropped Malware\REQUEST FOR QUOTATION_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Dropped Malware\REQUEST FOR QUOTATION_pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5295f6c5b65128e588d0b582be289ab6d
SHA1fd6bd3b6d93a374b3c1806928c2979c97a5818f4
SHA25653f3373a9c431f530f34f34dca345c7bdc5ed31693d7186bb8a1ce395d6a0302
SHA5124a5c488e5a1ae1f53d72fb747fa406350280f6d7584d3d2698bc1cbd259b987ec429bd540b6c656e9c00037fb2d3bd680774d01a6edefd6c0c0eae5b4cf5c631