Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2022, 16:33

General

  • Target

    DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe

  • Size

    461KB

  • MD5

    26860d51fddf664076d1cf601e43ba1d

  • SHA1

    dcd3fa1f67c3a7496caebd09c40cf8c6e5846c53

  • SHA256

    7a73079ae74c6c75f4f72bdae2437960533e8532a26b10dc98df4d8caf272f5e

  • SHA512

    e7aca103565635e73a5ce0fe64027dfdec356390f39537aec134611a6aeee176f666e5aada2cae90cebb7d3002bce43c0c251a79f28d95a09ca1a36e159dd513

  • SSDEEP

    12288:vj3ZrR7VyT/IdT5D7E61U6NolW1M6wRs:vj9Rs/IdFPU6+l0

Malware Config

Extracted

Family

formbook

Campaign

nrln

Decoy

IG7zJSm49UqTTuu/N/oTCIg=

CVLdAPgw0CRSMuZnRRU=

PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG

5i6p4GeQqtBgNRfGNQ==

5984keYswxh8mGZHz4ipAHtQ

VNJaK4Gh0CrOvHpW/p353A==

71rEtrL2icToyKGhcWrTxjsFU5T98zeO

r3q1sy1iZaL+2XIUAob7yw==

9+83Qkrk/vV/jVXsDvoTCIg=

aMFAgYF1prov8/UErH/Y1A==

Alqtx/0rxwEbCLdudftl

ImCbnglBSUHF0mv2tTSP40bPeYao

s4DFNvAJ4GIJ+g==

phOa6mtS8QQICuZnRRU=

7TSu5vqRtB45EZtf4WDSTBHPeYao

ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=

HF7jKjbGox2SAffTPw==

yAM3mOQot5l+cD0ikR5MGp8=

UYzW0/8z70JcQenVLidu1kLPeYao

OoCznp5UWz+hT9OBFXbfVhXPeYao

Extracted

Family

xloader

Version

3.8

Campaign

nrln

Decoy

IG7zJSm49UqTTuu/N/oTCIg=

CVLdAPgw0CRSMuZnRRU=

PiA5Z3umP2NyX81VGQhjWyS59nFYhXiG

5i6p4GeQqtBgNRfGNQ==

5984keYswxh8mGZHz4ipAHtQ

VNJaK4Gh0CrOvHpW/p353A==

71rEtrL2icToyKGhcWrTxjsFU5T98zeO

r3q1sy1iZaL+2XIUAob7yw==

9+83Qkrk/vV/jVXsDvoTCIg=

aMFAgYF1prov8/UErH/Y1A==

Alqtx/0rxwEbCLdudftl

ImCbnglBSUHF0mv2tTSP40bPeYao

s4DFNvAJ4GIJ+g==

phOa6mtS8QQICuZnRRU=

7TSu5vqRtB45EZtf4WDSTBHPeYao

ImPWqwUUIVWMQLyMbUab7tmspvNCcT8=

HF7jKjbGox2SAffTPw==

yAM3mOQot5l+cD0ikR5MGp8=

UYzW0/8z70JcQenVLidu1kLPeYao

OoCznp5UWz+hT9OBFXbfVhXPeYao

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\DOCUMENTO DE ENVÍO DE DHL AWB _111832457673,pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4656
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4260
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1520

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/684-141-0x0000000003010000-0x00000000030FA000-memory.dmp

      Filesize

      936KB

    • memory/684-154-0x0000000008370000-0x00000000084CE000-memory.dmp

      Filesize

      1.4MB

    • memory/684-152-0x0000000008370000-0x00000000084CE000-memory.dmp

      Filesize

      1.4MB

    • memory/684-144-0x00000000081F0000-0x0000000008363000-memory.dmp

      Filesize

      1.4MB

    • memory/4260-138-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/4260-147-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/4260-139-0x0000000000FC0000-0x000000000130A000-memory.dmp

      Filesize

      3.3MB

    • memory/4260-140-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/4260-137-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4260-143-0x0000000000F30000-0x0000000000F40000-memory.dmp

      Filesize

      64KB

    • memory/4260-136-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4260-146-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4260-134-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4656-132-0x0000000000890000-0x0000000000904000-memory.dmp

      Filesize

      464KB

    • memory/5060-148-0x00000000002C0000-0x00000000002E7000-memory.dmp

      Filesize

      156KB

    • memory/5060-150-0x0000000002DE0000-0x000000000312A000-memory.dmp

      Filesize

      3.3MB

    • memory/5060-149-0x0000000000DB0000-0x0000000000DDD000-memory.dmp

      Filesize

      180KB

    • memory/5060-151-0x0000000002C40000-0x0000000002CCF000-memory.dmp

      Filesize

      572KB

    • memory/5060-153-0x0000000000DB0000-0x0000000000DDD000-memory.dmp

      Filesize

      180KB