Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
EFT Payment 27September.exe
Resource
win7-20220901-en
General
-
Target
EFT Payment 27September.exe
-
Size
426KB
-
MD5
99128801351b81b164690fb32ddfe74f
-
SHA1
f8f2a0beaf18ce9311ada5ae7fd8dde3914771de
-
SHA256
fac949564f4665701edaee8c5228133b6c84842fef319a82e8909ddeaa215de6
-
SHA512
22a6f3d58634d462fd4281dbe2b975df010056bf2b385be110256430289d198640422f0a149607ad72d331bd34cf769fb09d80d22b05da4817d6d1c6db2f91bb
-
SSDEEP
6144:EKTmSHR5ZwZv+Wxt5+3GE4msba3k4kwsEYA8Ki:XT/x5Zw1+WlA2Vb4kJbEYu
Malware Config
Extracted
formbook
4.1
tg49
497338.com
shoptickr.win
support.academy
cloud123.top
manhattanmaintenance.site
sustainabilityblock.com
mertbnkae.city
letshookup.site
aqiqahkarawang.site
play-demoslot-coktogel.app
taikatarot.info
insanxarakterleri.com
bobdoessport.co
inexecution-oarsman.net
aspirationit.com
88bet2255.com
northbowlodge.com
downjc.com
diecastcoin.site
pubiliweb.com
greatneckplaza.site
glowitt.com
marimenang.xyz
2ridgemoor.com
tf1938.xyz
mahmutogluinsaat.com
vanguard-vanguard.com
veronaroad.info
aldwickmeanclean.co.uk
darihobi.com
americafirsthellpteam01.me
butlerbobo.app
15ke.net
8888888.ltd
ipcommit.com
revolutionizeyourrevenue.com
aiweu.com
findlearn.net
visionfootball.info
putkimiessalo.info
diabetesequiment.tech
comprarfunkopop.info
fastfix.app
bjyart.com
alternafest.com
offerstream-2.za.com
bellecoo.com
gasbanor.online
veganrebels.uk
quannhu.ltd
agddistribuidora.com
thimopi-conduite.com
dallastexasmediation.com
asesoriaenbarcelona.pro
slimebeats.com
sylkynsora.com
incontactapp.co.uk
caminovacations.com
bets-bc-utuas.xyz
chamberofscientists.com
hart-oca.xyz
selfcareopedia.co.uk
soulsolutions.tech
hameenmaalampo.com
doge-miner.site
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4756-134-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4756-136-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/5044-143-0x0000000000D30000-0x0000000000D5F000-memory.dmp formbook behavioral2/memory/5044-147-0x0000000000D30000-0x0000000000D5F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3012 set thread context of 4756 3012 EFT Payment 27September.exe 78 PID 4756 set thread context of 3060 4756 aspnet_compiler.exe 54 PID 5044 set thread context of 3060 5044 netsh.exe 54 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4756 aspnet_compiler.exe 4756 aspnet_compiler.exe 4756 aspnet_compiler.exe 4756 aspnet_compiler.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe 5044 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4756 aspnet_compiler.exe 4756 aspnet_compiler.exe 4756 aspnet_compiler.exe 5044 netsh.exe 5044 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4756 aspnet_compiler.exe Token: SeDebugPrivilege 5044 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4756 3012 EFT Payment 27September.exe 78 PID 3012 wrote to memory of 4756 3012 EFT Payment 27September.exe 78 PID 3012 wrote to memory of 4756 3012 EFT Payment 27September.exe 78 PID 3012 wrote to memory of 4756 3012 EFT Payment 27September.exe 78 PID 3012 wrote to memory of 4756 3012 EFT Payment 27September.exe 78 PID 3012 wrote to memory of 4756 3012 EFT Payment 27September.exe 78 PID 3060 wrote to memory of 5044 3060 Explorer.EXE 79 PID 3060 wrote to memory of 5044 3060 Explorer.EXE 79 PID 3060 wrote to memory of 5044 3060 Explorer.EXE 79 PID 5044 wrote to memory of 1256 5044 netsh.exe 82 PID 5044 wrote to memory of 1256 5044 netsh.exe 82 PID 5044 wrote to memory of 1256 5044 netsh.exe 82
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\EFT Payment 27September.exe"C:\Users\Admin\AppData\Local\Temp\EFT Payment 27September.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:1256
-
-