Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/10/2022, 20:13

221018-yzmhxadee7 10

18/10/2022, 14:28

221018-rs73psgba7 10

Analysis

  • max time kernel
    1800s
  • max time network
    1802s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 20:13

General

  • Target

    payload.exe

  • Size

    185KB

  • MD5

    14382242e215d139c77c0ee9bb0c7ad6

  • SHA1

    3951322a28787e4757fd3715d518103d6c054960

  • SHA256

    5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

  • SHA512

    1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

  • SSDEEP

    3072:yXoVNpuuK+ArjKxjCpZomp/04AkJmHrwF8gUdSl5xCZqnr/xA3unPu:bfp5SZow/04tUuUdeSqri3gu

Malware Config

Extracted

Family

formbook

Campaign

knnt

Decoy

65SBubRb0cQTZyel+RrmtuIytWG7hIY=

lxY8gZLYuXPYl40/

IBCcbQLOUkWVL3cA/DkK2ei+vuKlXA==

4Lo6dar405m4hxqWl58sOc0=

4KyQBqNrzYWTI6Iv016m7BZVvuKlXA==

PyCmasPI0Lj0JTU=

hnoGNwDmybXus0PVH2S1Td2l0ZTJ

s4CRDagqgmaCo9bOBD4i

T5IbS3G46ZbN8RncbsWuAiWl0ZTJ

2vxQ/T6e+7vkjz9yriaOpBbO8bYapwAu

55558Jha4dgR7PCZrQ==

O9KAFJVY3c4V1Xi2rEGne4ZMtSY=

ZPih22lkYU3Yl40/

mCc1tbkLsWeH

MpbgOtnQvGu9jQ==

D6uAq4Gdj3UEkzmKkCOIW4BG

A3rp8NpDzp2Q

4WMaDz2Ff26SfX5xEaABgk0WTQ==

G16+qE5AFMf20h0PxfsyLIZMtSY=

az44qCVNL8dm2vG/nuEbI3K46HT5K44=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\payload.exe
      "C:\Users\Admin\AppData\Local\Temp\payload.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:5028
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1940
      • C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe
        "C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4812

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe

      Filesize

      185KB

      MD5

      14382242e215d139c77c0ee9bb0c7ad6

      SHA1

      3951322a28787e4757fd3715d518103d6c054960

      SHA256

      5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70

      SHA512

      1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b

    • memory/2576-144-0x0000000008300000-0x000000000846C000-memory.dmp

      Filesize

      1.4MB

    • memory/2576-135-0x0000000007260000-0x000000000739B000-memory.dmp

      Filesize

      1.2MB

    • memory/2576-142-0x0000000008300000-0x000000000846C000-memory.dmp

      Filesize

      1.4MB

    • memory/4812-149-0x0000000001790000-0x0000000001ADA000-memory.dmp

      Filesize

      3.3MB

    • memory/4812-148-0x0000000000AC0000-0x0000000000AEF000-memory.dmp

      Filesize

      188KB

    • memory/5028-133-0x0000000001160000-0x00000000014AA000-memory.dmp

      Filesize

      3.3MB

    • memory/5028-134-0x0000000000C80000-0x0000000000C90000-memory.dmp

      Filesize

      64KB

    • memory/5028-132-0x0000000000F70000-0x0000000000F9F000-memory.dmp

      Filesize

      188KB

    • memory/5028-137-0x0000000000F70000-0x0000000000F9F000-memory.dmp

      Filesize

      188KB

    • memory/5040-143-0x0000000001090000-0x00000000010BD000-memory.dmp

      Filesize

      180KB

    • memory/5040-141-0x0000000002EC0000-0x0000000002F4F000-memory.dmp

      Filesize

      572KB

    • memory/5040-140-0x00000000030A0000-0x00000000033EA000-memory.dmp

      Filesize

      3.3MB

    • memory/5040-139-0x0000000001090000-0x00000000010BD000-memory.dmp

      Filesize

      180KB

    • memory/5040-138-0x0000000000AD0000-0x0000000000B27000-memory.dmp

      Filesize

      348KB