Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2022, 22:38

General

  • Target

    445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1.msi

  • Size

    784KB

  • MD5

    dba4ccecc8307d0605845fd39e42ae5e

  • SHA1

    eb125af24da96fa4d4edd94cec7dab168735309e

  • SHA256

    445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1

  • SHA512

    fd4421a56d53a83b884baf710bd5ba0a079e1a99db7a7c64680c41b7a3e1aac00d61adf481fdb0ded216832a8e633381b9aeae9c456f5f49ff47ff5b391a68bb

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

ka

Decoy

whatisvipxlbody.com

ads-fas.com

starkce.com

get-zapt.com

meikind.com

mysoresite.com

worldlygone.win

contestrockets.com

ashleyrosemary.com

dr-dragon.com

magnet-o-board.net

uniqueappeals.win

advertising-research.net

anishnabek.com

myfaithwear.com

final90.online

paladinlawfirm.com

parousiatech.com

wmnpet.com

thefilmmedianetwork.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 8 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\445342537392aa1e3756715d6f4eaafa281c4b8d5a8bfd104978ce4ce1635ac1.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4528
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Installer\MSI1926.tmp"
        3⤵
          PID:2256
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
      • C:\Windows\Installer\MSI1926.tmp
        "C:\Windows\Installer\MSI1926.tmp"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Windows\Installer\MSI1926.tmp
          "C:\Windows\Installer\MSI1926.tmp"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4736
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1588

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSI1926.tmp

      Filesize

      757KB

      MD5

      796f982d0dfe5b16b3df76473a919b50

      SHA1

      6a7f3e45afe268a4a630ce57d3cacd7ebe208ec1

      SHA256

      c3791863ec4be69c97f366b7e73ed9e5e18f3fd8c1e1cbf3dffac226313272f2

      SHA512

      09492b47ee13d5c13c6aa6bbc0b3322d8a96c9caa328040477120415d4c544397079264248b1290fe412e51ae2cf62ca702b7da6a76d41d2acff5668a92e8064

    • C:\Windows\Installer\MSI1926.tmp

      Filesize

      757KB

      MD5

      796f982d0dfe5b16b3df76473a919b50

      SHA1

      6a7f3e45afe268a4a630ce57d3cacd7ebe208ec1

      SHA256

      c3791863ec4be69c97f366b7e73ed9e5e18f3fd8c1e1cbf3dffac226313272f2

      SHA512

      09492b47ee13d5c13c6aa6bbc0b3322d8a96c9caa328040477120415d4c544397079264248b1290fe412e51ae2cf62ca702b7da6a76d41d2acff5668a92e8064

    • C:\Windows\Installer\MSI1926.tmp

      Filesize

      757KB

      MD5

      796f982d0dfe5b16b3df76473a919b50

      SHA1

      6a7f3e45afe268a4a630ce57d3cacd7ebe208ec1

      SHA256

      c3791863ec4be69c97f366b7e73ed9e5e18f3fd8c1e1cbf3dffac226313272f2

      SHA512

      09492b47ee13d5c13c6aa6bbc0b3322d8a96c9caa328040477120415d4c544397079264248b1290fe412e51ae2cf62ca702b7da6a76d41d2acff5668a92e8064

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      226c7e95b55a48dd0f2fc369c042e6cd

      SHA1

      337f55dcdc7c11971abb0ad111d340bef096f4fe

      SHA256

      2d007b55982bad5f6a52e59669a5eac8057fc339cfffee99d4a0199deb9d4bd6

      SHA512

      f373fa891fd43c9a9f12056ff3c48c954cb667a0c66add69e09150b287ed070080e908f58c559ecb1d5fd383ad83201e696b1c1d30f66160d89d97c3c107cc32

    • \??\Volume{40beaa24-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{da170177-e7e8-4bee-92e3-df4943b89cac}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      403cd37c18a0e3e8c20bb05b09472808

      SHA1

      5162e981e404351ae8f68734f87dbf2f4eb61274

      SHA256

      48a6b17cf0a34d6a245f0434f5a3f4bb6b462ca2d2e5d24bfc06d6f9c34a6003

      SHA512

      cba7e985b61d58ea77cb6946b279435cd5bb64cf889e22002d2e0913e2d56308a1707b6e7ceeab197aebb0031b93b6fba7a49c701f51ec79ce6f717393671c5b

    • memory/2480-141-0x0000000007BA0000-0x0000000007C9F000-memory.dmp

      Filesize

      1020KB

    • memory/2480-151-0x0000000007CA0000-0x0000000007DEA000-memory.dmp

      Filesize

      1.3MB

    • memory/2480-149-0x0000000007CA0000-0x0000000007DEA000-memory.dmp

      Filesize

      1.3MB

    • memory/3476-146-0x0000000000E40000-0x0000000000E6A000-memory.dmp

      Filesize

      168KB

    • memory/3476-145-0x0000000000F80000-0x0000000000F94000-memory.dmp

      Filesize

      80KB

    • memory/3476-147-0x0000000002EB0000-0x00000000031FA000-memory.dmp

      Filesize

      3.3MB

    • memory/3476-148-0x0000000002CB0000-0x0000000002D43000-memory.dmp

      Filesize

      588KB

    • memory/3476-150-0x0000000000E40000-0x0000000000E6A000-memory.dmp

      Filesize

      168KB

    • memory/4736-143-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4736-140-0x0000000000D40000-0x0000000000D54000-memory.dmp

      Filesize

      80KB

    • memory/4736-139-0x00000000009D0000-0x0000000000D1A000-memory.dmp

      Filesize

      3.3MB

    • memory/4736-138-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB