Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
modified OC shipment 211014093.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
modified OC shipment 211014093.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
modified OC shipment 211014093.iso
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
modified OC shipment 211014093.iso
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
modified OC shipment 211014093.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
modified OC shipment 211014093.exe
Resource
win10v2004-20240802-en
General
-
Target
modified OC shipment 211014093.exe
-
Size
1.7MB
-
MD5
c7b0d2cf8de84628d2f35ce5b1ce7235
-
SHA1
9ac35351c3d5a33d37d16beaa1b3c05d8d2cb6f0
-
SHA256
a1a217cddc25003f90053c9a94469cb43ebdebab8caf338d3c95fdc5f4102802
-
SHA512
394c35bc64387301a63bed37ad0d126e6cf4da748102c186eac324667a353f6ec590e8f70746ffaa93ba8a7b831a9ac3e3d5729b2ab0922bff1f13f0235bb03d
-
SSDEEP
49152:bfd0Na41q6kAWMXg5Kt2U8yO7W1ueBRDqh:h0KqLXuKURWu0Dq
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2972 created 3464 2972 modified OC shipment 211014093.exe 56 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Oraqylx = "C:\\Users\\Admin\\AppData\\Roaming\\Oraqylx.exe" modified OC shipment 211014093.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 4292 2972 modified OC shipment 211014093.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language modified OC shipment 211014093.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2972 modified OC shipment 211014093.exe 2972 modified OC shipment 211014093.exe 2972 modified OC shipment 211014093.exe 2972 modified OC shipment 211014093.exe 4292 InstallUtil.exe 4292 InstallUtil.exe 4292 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2972 modified OC shipment 211014093.exe Token: SeDebugPrivilege 2972 modified OC shipment 211014093.exe Token: SeDebugPrivilege 4292 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83 PID 2972 wrote to memory of 4292 2972 modified OC shipment 211014093.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\modified OC shipment 211014093.exe"C:\Users\Admin\AppData\Local\Temp\modified OC shipment 211014093.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-