Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2022, 22:38

General

  • Target

    445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1.msi

  • Size

    784KB

  • MD5

    dba4ccecc8307d0605845fd39e42ae5e

  • SHA1

    eb125af24da96fa4d4edd94cec7dab168735309e

  • SHA256

    445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1

  • SHA512

    fd4421a56d53a83b884baf710bd5ba0a079e1a99db7a7c64680c41b7a3e1aac00d61adf481fdb0ded216832a8e633381b9aeae9c456f5f49ff47ff5b391a68bb

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ka

Decoy

whatisvipxlbody.com

ads-fas.com

starkce.com

get-zapt.com

meikind.com

mysoresite.com

worldlygone.win

contestrockets.com

ashleyrosemary.com

dr-dragon.com

magnet-o-board.net

uniqueappeals.win

advertising-research.net

anishnabek.com

myfaithwear.com

final90.online

paladinlawfirm.com

parousiatech.com

wmnpet.com

thefilmmedianetwork.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 10 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1356
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1.msi
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:364
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\Installer\MSI7ABE.tmp
      "C:\Windows\Installer\MSI7ABE.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\Installer\MSI7ABE.tmp
        "C:\Windows\Installer\MSI7ABE.tmp"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\SysWOW64\msdt.exe
          "C:\Windows\SysWOW64\msdt.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1616
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\Installer\MSI7ABE.tmp"
            5⤵
              PID:984
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1112
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000320" "00000000000003D0"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1440

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSI7ABE.tmp

      Filesize

      757KB

      MD5

      796f982d0dfe5b16b3df76473a919b50

      SHA1

      6a7f3e45afe268a4a630ce57d3cacd7ebe208ec1

      SHA256

      c3791863ec4be69c97f366b7e73ed9e5e18f3fd8c1e1cbf3dffac226313272f2

      SHA512

      09492b47ee13d5c13c6aa6bbc0b3322d8a96c9caa328040477120415d4c544397079264248b1290fe412e51ae2cf62ca702b7da6a76d41d2acff5668a92e8064

    • C:\Windows\Installer\MSI7ABE.tmp

      Filesize

      757KB

      MD5

      796f982d0dfe5b16b3df76473a919b50

      SHA1

      6a7f3e45afe268a4a630ce57d3cacd7ebe208ec1

      SHA256

      c3791863ec4be69c97f366b7e73ed9e5e18f3fd8c1e1cbf3dffac226313272f2

      SHA512

      09492b47ee13d5c13c6aa6bbc0b3322d8a96c9caa328040477120415d4c544397079264248b1290fe412e51ae2cf62ca702b7da6a76d41d2acff5668a92e8064

    • C:\Windows\Installer\MSI7ABE.tmp

      Filesize

      757KB

      MD5

      796f982d0dfe5b16b3df76473a919b50

      SHA1

      6a7f3e45afe268a4a630ce57d3cacd7ebe208ec1

      SHA256

      c3791863ec4be69c97f366b7e73ed9e5e18f3fd8c1e1cbf3dffac226313272f2

      SHA512

      09492b47ee13d5c13c6aa6bbc0b3322d8a96c9caa328040477120415d4c544397079264248b1290fe412e51ae2cf62ca702b7da6a76d41d2acff5668a92e8064

    • memory/364-54-0x000007FEFBCE1000-0x000007FEFBCE3000-memory.dmp

      Filesize

      8KB

    • memory/1356-65-0x00000000068B0000-0x00000000069FA000-memory.dmp

      Filesize

      1.3MB

    • memory/1356-67-0x00000000064A0000-0x0000000006571000-memory.dmp

      Filesize

      836KB

    • memory/1356-76-0x0000000007670000-0x00000000077D0000-memory.dmp

      Filesize

      1.4MB

    • memory/1616-71-0x0000000000290000-0x0000000000384000-memory.dmp

      Filesize

      976KB

    • memory/1616-72-0x0000000000080000-0x00000000000AA000-memory.dmp

      Filesize

      168KB

    • memory/1616-74-0x0000000002430000-0x0000000002733000-memory.dmp

      Filesize

      3.0MB

    • memory/1616-75-0x0000000002160000-0x00000000021F3000-memory.dmp

      Filesize

      588KB

    • memory/1656-58-0x0000000076281000-0x0000000076283000-memory.dmp

      Filesize

      8KB

    • memory/1696-64-0x0000000000580000-0x0000000000594000-memory.dmp

      Filesize

      80KB

    • memory/1696-66-0x00000000005C0000-0x00000000005D4000-memory.dmp

      Filesize

      80KB

    • memory/1696-63-0x0000000000700000-0x0000000000A03000-memory.dmp

      Filesize

      3.0MB

    • memory/1696-69-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1696-62-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB