Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
812KB
-
MD5
909d921710d0a5bc4ddfacb0ced137bf
-
SHA1
fdea869c122579b91b37eb9c30208645191375b1
-
SHA256
f2a0159fafd3bdbe6b457f8f724e142c8cfd9cb0eb02b508729cc7e3c42cf593
-
SHA512
afc37126846a38d7118fbcc44358f4b9d45a3ce5ad4fa4b1ef7ae65660b05cf0a3ca7f39a2da09eca5ac55eccdf09ea016ed076ee66ead0232b49ce0a94b68c2
-
SSDEEP
12288:9RWl0W42kA3TOGU2ybvNTjhFG8KBvqKT8B8IHhp2TBS:iw2kQ6GTaFGDBvBCLBpAS
Malware Config
Extracted
formbook
4.1
sde7
lolfilmfestival.com
pousdaobosque.com
tangierfilm.com
valuedassist.com
qcrluxuryrentals.com
poc4cloudx.com
irizh.art
flowsever.com
serios-lifestyle.com
abc-diomain.com
bmwoemwarehouse.com
vivelamoda.com
thesycorax.online
goodjob129.com
hudyeanamaze.com
pabcp.com
millennialworkouts.com
gpcr-compound-library.com
rotyupin.xyz
hnkcsm.com
tgcsi.com
atfirstbank.com
kk-casemanagement.com
holiie.online
collier-secret-sept-cieux.com
evibnb.com
bestfortherest.icu
courier-order.info
hrcpetrol.com
impresaallitaliana.com
primaldirective.com
ezpromolink.com
stgilesjms.co.uk
bolometrics.com
pura-vida-apts.com
mumbaitowingservice.com
coloradomicrogreens.net
wallarts.space
yahtjd.com
digitalkreativeco.com
skopeintechnology.com
casalindatabletop.com
handmadebeauty.net
thc-olie-shop.store
xel-toys.com
youngqueen.club
maltepeescort.club
weylanstroic.xyz
kingdombuilders-group.com
strange-ratings.com
yuma-airbox.com
biuysjcims.icu
itsourworld.biz
seobet.online
decisionsandplanning.com
blanka.beauty
hsbanye.com
2elevenmezcal.co.uk
liveoutloud4u.com
ronlynngardens.com
resorttag.com
marcelldiahwedding.faith
ez-lyfe.net
celebrityauctions.net
paidpertv.biz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4348-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4348-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4428-147-0x00000000010D0000-0x00000000010FF000-memory.dmp formbook behavioral2/memory/4428-153-0x00000000010D0000-0x00000000010FF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1856 set thread context of 4348 1856 tmp.exe 88 PID 4348 set thread context of 2864 4348 tmp.exe 54 PID 4428 set thread context of 2864 4428 ipconfig.exe 54 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4428 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4348 tmp.exe 4348 tmp.exe 4348 tmp.exe 4348 tmp.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe 4428 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4348 tmp.exe 4348 tmp.exe 4348 tmp.exe 4428 ipconfig.exe 4428 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4348 tmp.exe Token: SeShutdownPrivilege 2864 Explorer.EXE Token: SeCreatePagefilePrivilege 2864 Explorer.EXE Token: SeDebugPrivilege 4428 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4348 1856 tmp.exe 88 PID 1856 wrote to memory of 4348 1856 tmp.exe 88 PID 1856 wrote to memory of 4348 1856 tmp.exe 88 PID 1856 wrote to memory of 4348 1856 tmp.exe 88 PID 1856 wrote to memory of 4348 1856 tmp.exe 88 PID 1856 wrote to memory of 4348 1856 tmp.exe 88 PID 2864 wrote to memory of 4428 2864 Explorer.EXE 91 PID 2864 wrote to memory of 4428 2864 Explorer.EXE 91 PID 2864 wrote to memory of 4428 2864 Explorer.EXE 91 PID 4428 wrote to memory of 2284 4428 ipconfig.exe 92 PID 4428 wrote to memory of 2284 4428 ipconfig.exe 92 PID 4428 wrote to memory of 2284 4428 ipconfig.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3668
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:2284
-
-