Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/10/2022, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
formbook5.exe
Resource
win7-20220901-en
General
-
Target
formbook5.exe
-
Size
718KB
-
MD5
39cffb366d87292f4b5efecf69c32774
-
SHA1
104fe2e617556e97af1a6f5082bba003a8e9ff3d
-
SHA256
37e9f15077e6491eade2a03b73b9f48b0037c6995a5fbecdae7a942710d1dde1
-
SHA512
d508a86dc49fc5737904b23ceab055329ebf47dc77b119297a8d1fb6c1f17217a24ec0a714787e8dcda215381549a04d77d8212f0fd83ddcf1de545453d4078f
-
SSDEEP
12288:3hUWMtLdsIJ4Il6RXTTpbe0RRnT7QLtAeSfN5r5pHM2as8i9Rr5o7We:xhMtBsy6R82RnTEmewN5rr8i98
Malware Config
Extracted
formbook
4.1
gs25
real-food.store
marketdatalibrary.com
jolidens.space
ydental.info
tattoosbyjayinked.com
buytradesellpei.com
61983.xyz
identitysolver.xyz
mgfang.com
teizer.one
staychillax.com
ylanzarote.com
workte.net
maukigato.shop
coolbag.site
btya1r.com
dkhaohao.shop
zugaro.xyz
boon168.com
xn--80aeegahlwtdkp.com
ofiarx.com
militaryees.com
moshrifmontagebau.com
usesportcompany.com
savagesocietyclothing.com
wethedreamrs.com
allhealthzdorovoiscilenie.sbs
legacycrossingbroker.com
dompietro.com
hallconciergerie.com
xn--289a95vn5cmx6a.com
siervostinting.com
windesk.info
braxton.construction
scarefullym.shop
organicyummyvegan.com
maniza.shop
moviesmod.one
wenmingsm.com
techgist.tech
infodescansovital.click
adsfuture.shop
54844.site
opensea.creditcard
yassinshield.com
daubacthanhdeneasy.online
governmentmarketstrategies.com
socioeconomical.pics
blackmail.guide
tdrevolution.net
mega-pornx.info
favrity.com
cuocsongtot2022.site
touchlyfe.com
track-usps.info
kitchentimeremodeling.com
jettylearn.com
hookguy.buzz
cojo.world
negocio-naweb.store
kern3361ren1.site
smithbryan.website
jlxseat.top
rocksology.net
crownglassware.info
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/108-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/108-65-0x000000000041F1B0-mapping.dmp formbook behavioral1/memory/108-67-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/108-75-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/988-79-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/988-82-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 956 set thread context of 108 956 formbook5.exe 29 PID 108 set thread context of 1396 108 RegSvcs.exe 15 PID 108 set thread context of 1396 108 RegSvcs.exe 15 PID 988 set thread context of 1396 988 svchost.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 956 formbook5.exe 108 RegSvcs.exe 108 RegSvcs.exe 108 RegSvcs.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1396 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 108 RegSvcs.exe 108 RegSvcs.exe 108 RegSvcs.exe 108 RegSvcs.exe 988 svchost.exe 988 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 956 formbook5.exe Token: SeDebugPrivilege 108 RegSvcs.exe Token: SeDebugPrivilege 988 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE 1396 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 956 wrote to memory of 812 956 formbook5.exe 27 PID 956 wrote to memory of 812 956 formbook5.exe 27 PID 956 wrote to memory of 812 956 formbook5.exe 27 PID 956 wrote to memory of 812 956 formbook5.exe 27 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 956 wrote to memory of 108 956 formbook5.exe 29 PID 108 wrote to memory of 988 108 RegSvcs.exe 30 PID 108 wrote to memory of 988 108 RegSvcs.exe 30 PID 108 wrote to memory of 988 108 RegSvcs.exe 30 PID 108 wrote to memory of 988 108 RegSvcs.exe 30 PID 988 wrote to memory of 556 988 svchost.exe 31 PID 988 wrote to memory of 556 988 svchost.exe 31 PID 988 wrote to memory of 556 988 svchost.exe 31 PID 988 wrote to memory of 556 988 svchost.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\formbook5.exe"C:\Users\Admin\AppData\Local\Temp\formbook5.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YaFLXNhWEOOsy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp91E4.tmp"3⤵
- Creates scheduled task(s)
PID:812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵PID:556
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5772e2f364e8e1c30bc82df49dadc53a3
SHA1be356b93872a3a948cef94d9266a164ad2f2fa01
SHA256210b25a08cadd6cd9c62dd19fc59b57abb0092f103a5a35efd14907a1144255f
SHA512a939624853d6216c34a9b07a60c7ade3396ad1a29ed836f50884636b4303020f87a7563a9979db78923cb9db7760d979190ef594e4959dcf269f77312a51fe66