Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.PWSX-gen.1463.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.PWSX-gen.1463.exe
-
Size
1.1MB
-
MD5
0ce09a0d9e6f501f9b4839058a712ef6
-
SHA1
de969216ac3b44862c490f0d8e74911fe36915e0
-
SHA256
68ecb3a0784bbfd4ac9f3d1c76cfc09cff02b4298839e2e1b293e9ef8833b265
-
SHA512
b63d3616ece35dbe634558a79d7d6cacc1b5d237288b440aa1f9e0e78c73f9cc1875e590dfed4269cb0b1ae41f982e388d9da0563a752371d33da83ff5745843
-
SSDEEP
12288:2qDhBzE3BExvIGnv9friMBm2pIsVMspKeUlP4ysY/LC+kobWX6GeakXwM:lcREqGFfri63K1sY/LoqWX6F7f
Malware Config
Extracted
formbook
4.1
s92n
granlogiasoberana.com
roblox-so.com
buycarsonline.fyi
thesaleworld.com
laterlifegroup.com
lov3stia.com
frdgg.cfd
businessllp.com
margaretsbeautifiedshop.com
123bet.store
sadalagran.com
psychedelicshippiez.com
bonitaspringskayakrentals.com
thorsbyinsurance.com
visionauto-int.com
k3cosmetic.skin
ilogtv.com
one-big-yes.com
houseofmorrow.com
pisigranjariogrande.online
dccasualwear.com
cuemark.xyz
robotics6.com
maddieschiess.com
centraleasy.sbs
attymarket.com
protectordoormi.com
integratedpayment.solutions
diamondtattoo.contact
alliancesecuritiesandcour.com
mountkaalaranch.net
nobodyspuppet.com
ygiciftee-zakroapsala.online
heartfocusedmethod.com
evolutionaryclassics.com
whizfirst.com
redeyeload.site
muslimflyers.com
mihantrade.com
naturalproductsv.online
perfectjobgifts.com
historias-abdl.com
growelevation.agency
humanresourcesai.com
prime-cmed.com
abhishekdanidesign.com
codeonsp.site
vaulteddb.com
drmurilobarbalho.com
sceju29t.xyz
starmapsky.com
winsettfamilyphotography.com
patibannister.com
condotel-vietnam.com
simmonsmotorsales.com
tobenaifusen.com
1yes.store
8565933.xyz
esenarh.com
701fegans.com
info-lani.com
bluenestcapital.com
41749.xyz
manageable-cv.com
bico-tender.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/584-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/584-68-0x000000000041F150-mapping.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1280 set thread context of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 1328 powershell.exe 584 SecuriteInfo.com.Win32.PWSX-gen.1463.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe Token: SeDebugPrivilege 1328 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1328 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 28 PID 1280 wrote to memory of 1328 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 28 PID 1280 wrote to memory of 1328 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 28 PID 1280 wrote to memory of 1328 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 28 PID 1280 wrote to memory of 1136 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 31 PID 1280 wrote to memory of 1136 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 31 PID 1280 wrote to memory of 1136 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 31 PID 1280 wrote to memory of 1136 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 31 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32 PID 1280 wrote to memory of 584 1280 SecuriteInfo.com.Win32.PWSX-gen.1463.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1463.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1463.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XtxQKr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XtxQKr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAB3E.tmp"2⤵
- Creates scheduled task(s)
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1463.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.1463.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:584
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cdca972ce445f258849d2ef7c7b1dec3
SHA1abaede465a0d21b45fea8e0b6a9e7bb40663ac35
SHA2563a7ccb2075eb1cb156100c8001e368ab64709516e0535f661f9a2d4a6c7b7c1a
SHA5120fbbd3fdad8db2f6744c5d9a32c73e66b2566aa43f130f75a5a44563288833274cfa697907036106f9f3f5e4b299a45342391071e943d6abb2fc5ea6e2177cbc