Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
ETOS project Specifications.exe
Resource
win7-20220812-en
General
-
Target
ETOS project Specifications.exe
-
Size
732KB
-
MD5
2bf247b62106faa756c070c4e017d402
-
SHA1
63ac2ac4e94d66d285968035c55f02917c419744
-
SHA256
90afcb6b9e301d7081737182f7f3e3bff751ba972d161d8da5c24db1d0d36dc0
-
SHA512
be7c4f17616124423de69e3e2846ce89192c9577111a81bbd13ddccbdb3cae20fd18a92ea6984198ad4e0c3b8b287e0c6df66a99b067ff745bfe177f8d9248f3
-
SSDEEP
12288:MmAzQsRZDsItEVJ6AKJQ84lSt0/2V+4HPI/yCfJuZXLN1:+zQswikDD5lSt0+ZQKUJuZ7N
Malware Config
Extracted
formbook
4.1
vo84
laurenciavachulova.one
sabuilders.store
masxot.xyz
matchfail.com
suararakyatnews.net
kykm.rest
richardsmartinezh.site
morehouseweneedyou.com
depressivepawnclub.xyz
yenilenme.net
allhiejralstore.com
9993808.com
sleepshastra.com
weplay-classic.com
propertyofpalestine.com
onirica.club
yohelios.com
fcorruption.com
tongdans.top
richmondmassage.store
gaoxiaodongtu.com
wolff.plus
neinagordon.com
elite-galaxy.click
technologyaware.info
9798tkrrmu1eqtjoree0640.com
ecdtvx.xyz
hottashinkyusekkotsuin.com
bitdesks.com
xn--mgclimatizacin-xob.com
jkd7s.biz
candirox.com
petal-badge.com
prototypespectator.top
ovsw.bar
ninideliciaria.com
aunehellmanm.top
ky5320.com
628857.com
parkitny.net
hxziykhju.top
04874.top
novatech.limited
reyhanlitonerservisi.xyz
celebrate-the-date.com
ynskpf.online
levejur.sbs
unliu.top
childcaremarketingmasters.com
huxiaonet.com
upgradingcompanyllc.com
treatmemory-loss.site
ywamne.com
fudynmalc.com
51d8tlrjmk5qazvnrfe9904.com
english101.net
lovememail.shop
73669.top
nurse-caregiver-jobs.site
huqedii.fun
bloomingoaks.africa
taloontuote.com
windfinal.shop
gazaxr.xyz
mamuari.store
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2180-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2180-141-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3984-147-0x0000000000170000-0x000000000019F000-memory.dmp formbook behavioral2/memory/3984-149-0x0000000000170000-0x000000000019F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4764 set thread context of 2180 4764 ETOS project Specifications.exe 92 PID 2180 set thread context of 3092 2180 ETOS project Specifications.exe 37 PID 3984 set thread context of 3092 3984 wscript.exe 37 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2180 ETOS project Specifications.exe 2180 ETOS project Specifications.exe 2180 ETOS project Specifications.exe 2180 ETOS project Specifications.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe 3984 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3092 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2180 ETOS project Specifications.exe 2180 ETOS project Specifications.exe 2180 ETOS project Specifications.exe 3984 wscript.exe 3984 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2180 ETOS project Specifications.exe Token: SeDebugPrivilege 3984 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2180 4764 ETOS project Specifications.exe 92 PID 4764 wrote to memory of 2180 4764 ETOS project Specifications.exe 92 PID 4764 wrote to memory of 2180 4764 ETOS project Specifications.exe 92 PID 4764 wrote to memory of 2180 4764 ETOS project Specifications.exe 92 PID 4764 wrote to memory of 2180 4764 ETOS project Specifications.exe 92 PID 4764 wrote to memory of 2180 4764 ETOS project Specifications.exe 92 PID 3092 wrote to memory of 3984 3092 Explorer.EXE 93 PID 3092 wrote to memory of 3984 3092 Explorer.EXE 93 PID 3092 wrote to memory of 3984 3092 Explorer.EXE 93 PID 3984 wrote to memory of 2488 3984 wscript.exe 94 PID 3984 wrote to memory of 2488 3984 wscript.exe 94 PID 3984 wrote to memory of 2488 3984 wscript.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ETOS project Specifications.exe"3⤵PID:2488
-
-