Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1
-
Size
784KB
-
Sample
220724-2kc8gabchn
-
MD5
dba4ccecc8307d0605845fd39e42ae5e
-
SHA1
eb125af24da96fa4d4edd94cec7dab168735309e
-
SHA256
445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1
-
SHA512
fd4421a56d53a83b884baf710bd5ba0a079e1a99db7a7c64680c41b7a3e1aac00d61adf481fdb0ded216832a8e633381b9aeae9c456f5f49ff47ff5b391a68bb
Static task
static1
Behavioral task
behavioral1
Sample
445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1.msi
Resource
win7-20220718-en
Malware Config
Extracted
formbook
3.9
ka
whatisvipxlbody.com
ads-fas.com
starkce.com
get-zapt.com
meikind.com
mysoresite.com
worldlygone.win
contestrockets.com
ashleyrosemary.com
dr-dragon.com
magnet-o-board.net
uniqueappeals.win
advertising-research.net
anishnabek.com
myfaithwear.com
final90.online
paladinlawfirm.com
parousiatech.com
wmnpet.com
thefilmmedianetwork.com
ernestobrytennis.com
hawaiihangouts.com
theboywhocriediraq.com
jsxzntt.com
wl266.info
suiyicao.com
feelliz.com
hpguk.com
endurancetestx.com
crescentmobiledetailing.com
xn--jgun5zjw5a.com
thesecretgardenrsf.com
moversfoxborough.com
6cc6.info
fangjiadili.com
videotvnovosti.com
humananalisys.com
procedure-idea.tech
notbrice.net
revesacc.men
51web.info
structureimage.com
jubileehotelleeds.com
062ope.com
ztjgc.com
timcloud.win
zerokidsfashion.com
gw3338368.com
db-archviz.com
thebadagavillage.com
towblade.com
lebientotnomme.com
technosweed.info
byx0o6.info
howtomakelifework.com
equifaxsecurity017.com
pontoon.online
jennytanguyen.com
tianlongnet.com
radityaguntur.com
bigtruckptos.com
tribalvibevlog.com
lkjgame666.com
tmqingxin.com
bolipy.com
Targets
-
-
Target
445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1
-
Size
784KB
-
MD5
dba4ccecc8307d0605845fd39e42ae5e
-
SHA1
eb125af24da96fa4d4edd94cec7dab168735309e
-
SHA256
445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1
-
SHA512
fd4421a56d53a83b884baf710bd5ba0a079e1a99db7a7c64680c41b7a3e1aac00d61adf481fdb0ded216832a8e633381b9aeae9c456f5f49ff47ff5b391a68bb
-
Formbook payload
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-