Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
ORDER.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ORDER.exe
Resource
win10v2004-20240802-en
General
-
Target
ORDER.exe
-
Size
1.1MB
-
MD5
2a2ee6dc6b324aed33389ca52bb82005
-
SHA1
7fa45dad561f81d5a892b3ec84e8fad4ed751e82
-
SHA256
51fff4f47965c96f05725a7655150c7dad217117e8c4b393a02b5b9a415747cb
-
SHA512
c83ed263130e762b7f89341be52abaddda581215476536095856f0bd9b17244f43b98617de88f51c9247c0ca3c2ab1a5c8af3f13540ce99177ec02ff1a329ad7
-
SSDEEP
24576:dAHnh+eWsN3skA4RV1Hom2KXMmHa7bubTGMel5uz5:8h+ZkldoPK8Ya7sbe3K
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2748 452 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 452 ORDER.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 452 ORDER.exe 452 ORDER.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 452 ORDER.exe 452 ORDER.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 452 wrote to memory of 4040 452 ORDER.exe 87 PID 452 wrote to memory of 4040 452 ORDER.exe 87 PID 452 wrote to memory of 4040 452 ORDER.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"2⤵PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 6482⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 452 -ip 4521⤵PID:4756