Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe
-
Size
2.4MB
-
MD5
33c42601c5cc7ff28159c7c024dc60e6
-
SHA1
85fae67ade783ecae31a392235599b4ec7ab5b9b
-
SHA256
01d1c1090c58d5d76577a3354a1bc81732f2a58ada4c86f935c71a676584d54c
-
SHA512
4df9c9c508f59c94ed949eed319a9d9957de3707d82da18e85a9710470be312a69eb70567f582e75a9d94b28066be1640e01bd7ac68565eda6d02e718019265c
-
SSDEEP
49152:jKv5tHSZPcn/XLmFCoxnximwEsLknp7YpSa8+0y:GvfSZPcnTmvNwEWsp7r80
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3420 1580 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3220 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3332 powershell.exe 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe Token: SeDebugPrivilege 3332 powershell.exe Token: SeDebugPrivilege 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3196 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 30 PID 1580 wrote to memory of 3196 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 30 PID 1580 wrote to memory of 3196 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 30 PID 1580 wrote to memory of 3196 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 30 PID 3196 wrote to memory of 3220 3196 cmd.exe 32 PID 3196 wrote to memory of 3220 3196 cmd.exe 32 PID 3196 wrote to memory of 3220 3196 cmd.exe 32 PID 3196 wrote to memory of 3220 3196 cmd.exe 32 PID 1580 wrote to memory of 3332 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 33 PID 1580 wrote to memory of 3332 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 33 PID 1580 wrote to memory of 3332 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 33 PID 1580 wrote to memory of 3332 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 33 PID 1580 wrote to memory of 3420 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 35 PID 1580 wrote to memory of 3420 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 35 PID 1580 wrote to memory of 3420 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 35 PID 1580 wrote to memory of 3420 1580 Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Przychodząca wiadomość SWIFT EUR 7.592,50.pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3220
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 5202⤵
- Program crash
PID:3420
-