Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2022, 11:47

General

  • Target

    tmp.exe

  • Size

    1.1MB

  • MD5

    911b41caf07e1358460415fe7ddc9ba5

  • SHA1

    2a2e2120055b91824166b4cbecb86b25cab7a6f1

  • SHA256

    4562af450cbc44c9ddf59509c802f83abcc2dc66a2eccc0b734ea7ceded60522

  • SHA512

    92f5410901ce62f81bd2d1e0e86cd3492b05fcf415a271e9784994239296b3001e1a53b5ff176d1c3cc09fa42ae1e0c379cada397c74d7e232590e048938b80d

  • SSDEEP

    12288:imIFTT41hw4e/ehLrz9+maNmNR734hodpBXk8jB6rSDdrCsv6ySk1hw4e/:lIF/L4LJwNmNYqpBXXQCOsvu4

Malware Config

Extracted

Family

formbook

Campaign

nytc

Decoy

xxa3lYw6m81Pd//kzzAdG4U=

YXZAfGEJkwXABM5TR/E=

hUbaOQOt0DYguI9XS8pwJrEZWmU=

A/ygqm4Kfa0kUcnqnsJDp+zEWGM=

RORz56hFPHnrLO2iW0+9

iqg4UizXgbNRcvmiW0+9

VRTafWQvdNtipVkn5VtZyrF/+rnbCQ==

gQueRkb7G4Z/Jvu3qBQZNo8=

ePKbHxG8f76FOQesODERPA==

fHESMDnjE3MqK+7b

0k/peV8LzCGeqzU7ODERPA==

cTQPl24ePactS+KiW0+9

pjTaSRTKnctzqirmZx/oa3X0tg==

aAWYMRriqLzAA85TR/E=

tDgT5cRmmQqRpFrkpR+4

drFaFOGXywjGUxzL9wm++AOs

Okbd//qcDXIbai4QB7WKaH+p6bEPPfgV

ae/IhkTwKWcXT9mY6A+++AOs

eEbmHeuHEHk4xoclVxQZNo8=

C2I8W0/9c+jsDk/CmEn8Ng==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:5016

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2204-144-0x0000000003300000-0x00000000033C8000-memory.dmp

      Filesize

      800KB

    • memory/2204-156-0x00000000033D0000-0x00000000034AA000-memory.dmp

      Filesize

      872KB

    • memory/2204-154-0x00000000033D0000-0x00000000034AA000-memory.dmp

      Filesize

      872KB

    • memory/2204-147-0x00000000085A0000-0x00000000086DB000-memory.dmp

      Filesize

      1.2MB

    • memory/4120-149-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/4120-146-0x0000000002D10000-0x0000000002D20000-memory.dmp

      Filesize

      64KB

    • memory/4120-139-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/4120-142-0x00000000010C0000-0x000000000140A000-memory.dmp

      Filesize

      3.3MB

    • memory/4120-141-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/4120-143-0x00000000007F0000-0x0000000000800000-memory.dmp

      Filesize

      64KB

    • memory/4480-135-0x0000000005770000-0x000000000577A000-memory.dmp

      Filesize

      40KB

    • memory/4480-136-0x0000000009AA0000-0x0000000009B3C000-memory.dmp

      Filesize

      624KB

    • memory/4480-137-0x0000000009B40000-0x0000000009BA6000-memory.dmp

      Filesize

      408KB

    • memory/4480-132-0x0000000000B10000-0x0000000000C2A000-memory.dmp

      Filesize

      1.1MB

    • memory/4480-134-0x00000000055E0000-0x0000000005672000-memory.dmp

      Filesize

      584KB

    • memory/4480-133-0x0000000005AB0000-0x0000000006054000-memory.dmp

      Filesize

      5.6MB

    • memory/5104-150-0x00000000011F0000-0x000000000153A000-memory.dmp

      Filesize

      3.3MB

    • memory/5104-152-0x0000000000A00000-0x0000000000A2B000-memory.dmp

      Filesize

      172KB

    • memory/5104-151-0x00000000006A0000-0x00000000006B7000-memory.dmp

      Filesize

      92KB

    • memory/5104-153-0x0000000001050000-0x00000000010DF000-memory.dmp

      Filesize

      572KB

    • memory/5104-155-0x0000000000A00000-0x0000000000A2B000-memory.dmp

      Filesize

      172KB