Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
ETOS project Specifications.exe
Resource
win7-20220812-en
General
-
Target
ETOS project Specifications.exe
-
Size
732KB
-
MD5
2bf247b62106faa756c070c4e017d402
-
SHA1
63ac2ac4e94d66d285968035c55f02917c419744
-
SHA256
90afcb6b9e301d7081737182f7f3e3bff751ba972d161d8da5c24db1d0d36dc0
-
SHA512
be7c4f17616124423de69e3e2846ce89192c9577111a81bbd13ddccbdb3cae20fd18a92ea6984198ad4e0c3b8b287e0c6df66a99b067ff745bfe177f8d9248f3
-
SSDEEP
12288:MmAzQsRZDsItEVJ6AKJQ84lSt0/2V+4HPI/yCfJuZXLN1:+zQswikDD5lSt0+ZQKUJuZ7N
Malware Config
Extracted
formbook
4.1
vo84
laurenciavachulova.one
sabuilders.store
masxot.xyz
matchfail.com
suararakyatnews.net
kykm.rest
richardsmartinezh.site
morehouseweneedyou.com
depressivepawnclub.xyz
yenilenme.net
allhiejralstore.com
9993808.com
sleepshastra.com
weplay-classic.com
propertyofpalestine.com
onirica.club
yohelios.com
fcorruption.com
tongdans.top
richmondmassage.store
gaoxiaodongtu.com
wolff.plus
neinagordon.com
elite-galaxy.click
technologyaware.info
9798tkrrmu1eqtjoree0640.com
ecdtvx.xyz
hottashinkyusekkotsuin.com
bitdesks.com
xn--mgclimatizacin-xob.com
jkd7s.biz
candirox.com
petal-badge.com
prototypespectator.top
ovsw.bar
ninideliciaria.com
aunehellmanm.top
ky5320.com
628857.com
parkitny.net
hxziykhju.top
04874.top
novatech.limited
reyhanlitonerservisi.xyz
celebrate-the-date.com
ynskpf.online
levejur.sbs
unliu.top
childcaremarketingmasters.com
huxiaonet.com
upgradingcompanyllc.com
treatmemory-loss.site
ywamne.com
fudynmalc.com
51d8tlrjmk5qazvnrfe9904.com
english101.net
lovememail.shop
73669.top
nurse-caregiver-jobs.site
huqedii.fun
bloomingoaks.africa
taloontuote.com
windfinal.shop
gazaxr.xyz
mamuari.store
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1224-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1224-64-0x000000000041F090-mapping.dmp formbook behavioral1/memory/1224-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/912-74-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/912-78-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 280 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1712 set thread context of 1224 1712 ETOS project Specifications.exe 27 PID 1224 set thread context of 1268 1224 ETOS project Specifications.exe 8 PID 912 set thread context of 1268 912 rundll32.exe 8 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1224 ETOS project Specifications.exe 1224 ETOS project Specifications.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1224 ETOS project Specifications.exe 1224 ETOS project Specifications.exe 1224 ETOS project Specifications.exe 912 rundll32.exe 912 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1224 ETOS project Specifications.exe Token: SeDebugPrivilege 912 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1712 wrote to memory of 1224 1712 ETOS project Specifications.exe 27 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 1268 wrote to memory of 912 1268 Explorer.EXE 28 PID 912 wrote to memory of 280 912 rundll32.exe 29 PID 912 wrote to memory of 280 912 rundll32.exe 29 PID 912 wrote to memory of 280 912 rundll32.exe 29 PID 912 wrote to memory of 280 912 rundll32.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"3⤵
- Deletes itself
PID:280
-
-