Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/10/2022, 20:13

221018-yzmhxadee7 10

18/10/2022, 14:28

221018-rs73psgba7 10

Analysis

  • max time kernel
    1800s
  • max time network
    1799s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2022, 20:13

General

  • Target

    payload.exe

  • Size

    185KB

  • MD5

    14382242e215d139c77c0ee9bb0c7ad6

  • SHA1

    3951322a28787e4757fd3715d518103d6c054960

  • SHA256

    5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

  • SHA512

    1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

  • SSDEEP

    3072:yXoVNpuuK+ArjKxjCpZomp/04AkJmHrwF8gUdSl5xCZqnr/xA3unPu:bfp5SZow/04tUuUdeSqri3gu

Malware Config

Extracted

Family

formbook

Campaign

knnt

Decoy

65SBubRb0cQTZyel+RrmtuIytWG7hIY=

lxY8gZLYuXPYl40/

IBCcbQLOUkWVL3cA/DkK2ei+vuKlXA==

4Lo6dar405m4hxqWl58sOc0=

4KyQBqNrzYWTI6Iv016m7BZVvuKlXA==

PyCmasPI0Lj0JTU=

hnoGNwDmybXus0PVH2S1Td2l0ZTJ

s4CRDagqgmaCo9bOBD4i

T5IbS3G46ZbN8RncbsWuAiWl0ZTJ

2vxQ/T6e+7vkjz9yriaOpBbO8bYapwAu

55558Jha4dgR7PCZrQ==

O9KAFJVY3c4V1Xi2rEGne4ZMtSY=

ZPih22lkYU3Yl40/

mCc1tbkLsWeH

MpbgOtnQvGu9jQ==

D6uAq4Gdj3UEkzmKkCOIW4BG

A3rp8NpDzp2Q

4WMaDz2Ff26SfX5xEaABgk0WTQ==

G16+qE5AFMf20h0PxfsyLIZMtSY=

az44qCVNL8dm2vG/nuEbI3K46HT5K44=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\payload.exe
      "C:\Users\Admin\AppData\Local\Temp\payload.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1208
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1148
      • C:\Program Files (x86)\Sqjl\updatemx6hz.exe
        "C:\Program Files (x86)\Sqjl\updatemx6hz.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1572

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Sqjl\updatemx6hz.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • C:\Program Files (x86)\Sqjl\updatemx6hz.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • \Program Files (x86)\Sqjl\updatemx6hz.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • \Program Files (x86)\Sqjl\updatemx6hz.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • \Program Files (x86)\Sqjl\updatemx6hz.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      932KB

      MD5

      661fd92d4eaeea3740649af5a484d7c8

      SHA1

      c93f868890fee1475f8ec9e7607e26f5dce67d54

      SHA256

      58a478f0560ea22c1bc194263f07cf6f3ecfe47d0c8b534a7bba185f28a1141f

      SHA512

      1fac03c20139fde41d121e0adbd02d127261ce061509996087fc1c80baf2fe0d0f70fed6b83d38a85cfa2e07d038ff809161c7ecce31ec44ac8b89740d3db15d

    • memory/1208-54-0x0000000000E50000-0x0000000000E7F000-memory.dmp

      Filesize

      188KB

    • memory/1208-55-0x00000000008D0000-0x0000000000BD3000-memory.dmp

      Filesize

      3.0MB

    • memory/1208-56-0x00000000000A0000-0x00000000000B0000-memory.dmp

      Filesize

      64KB

    • memory/1388-64-0x0000000004D30000-0x0000000004E4D000-memory.dmp

      Filesize

      1.1MB

    • memory/1388-66-0x0000000004D30000-0x0000000004E4D000-memory.dmp

      Filesize

      1.1MB

    • memory/1388-57-0x0000000006EC0000-0x000000000703B000-memory.dmp

      Filesize

      1.5MB

    • memory/1572-75-0x00000000011E0000-0x000000000120F000-memory.dmp

      Filesize

      188KB

    • memory/1572-76-0x0000000000C40000-0x0000000000F43000-memory.dmp

      Filesize

      3.0MB

    • memory/1652-63-0x0000000000A80000-0x0000000000B0F000-memory.dmp

      Filesize

      572KB

    • memory/1652-65-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/1652-62-0x00000000023D0000-0x00000000026D3000-memory.dmp

      Filesize

      3.0MB

    • memory/1652-60-0x0000000000ED0000-0x0000000000FC4000-memory.dmp

      Filesize

      976KB

    • memory/1652-61-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/1652-59-0x0000000075D01000-0x0000000075D03000-memory.dmp

      Filesize

      8KB