Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2022, 23:43

General

  • Target

    mary.exe

  • Size

    56KB

  • MD5

    e8bf77b057a93cafe70b86fdb9da6aed

  • SHA1

    53f70d6a1f0a48522d90e1612bdf3c4b122fc504

  • SHA256

    f53340a00d5248f81164bd5a1880698c4926cf62dc2fc5c93696f87780733b1a

  • SHA512

    56d4f69822d9790caec4d53a3112038c7b0b518c013638ad7865dbd7a5e80d3d46b4da5d6170e888f5f3ae6c58231b2c3fbc7763f3107965eedb52b05d46461f

  • SSDEEP

    768:k8s3JoK3x2Ncv+kIQZ5N9Fe6HmBouzruiRPPrk+FP:kB36I1vxIMW6HmBxuixPd

Malware Config

Extracted

Family

formbook

Campaign

bbuy

Decoy

wqbqKCTkCwjtbad3vwJI6Z+a

EqD7JRhUV2ZQDnU=

UlWd0LffZzZeGY0BzkxroA==

sAbXk3SNlPOcRleKI+k=

HCpzqZKnJGDpf+qsxnOnvQ==

vGdG6Ezu8mctzfLnmX/FLDeiPS3M

tcctT/pPwrv7mdA0aw==

Tr6fUz4Ae0mrGA==

NxZtBUfk3aqxS1eKI+k=

TSUVzyy9hBs65j7xXSRVBx+M

fObBavCu4OEt/0pTr98J

2ap9Oy1p8MQP+EtTr98J

FL4Q0TXr1iHWjezVUdQtFT4=

kSFvf2KUliCDOWwacw==

ctqtSLZvqqr/xym6xnOnvQ==

8DqrrnN58fVC

fIrZCP4xwLt7CkGppluStw==

PFKUNZxcpLCtk6yjMus=

4CKOs2UMhs9P8EvLAXO1Hj8aNA==

0pEGOQOa0+SOV9AnYg==

Extracted

Family

xloader

Version

3.Æ…

Campaign

bbuy

Decoy

wqbqKCTkCwjtbad3vwJI6Z+a

EqD7JRhUV2ZQDnU=

UlWd0LffZzZeGY0BzkxroA==

sAbXk3SNlPOcRleKI+k=

HCpzqZKnJGDpf+qsxnOnvQ==

vGdG6Ezu8mctzfLnmX/FLDeiPS3M

tcctT/pPwrv7mdA0aw==

Tr6fUz4Ae0mrGA==

NxZtBUfk3aqxS1eKI+k=

TSUVzyy9hBs65j7xXSRVBx+M

fObBavCu4OEt/0pTr98J

2ap9Oy1p8MQP+EtTr98J

FL4Q0TXr1iHWjezVUdQtFT4=

kSFvf2KUliCDOWwacw==

ctqtSLZvqqr/xym6xnOnvQ==

8DqrrnN58fVC

fIrZCP4xwLt7CkGppluStw==

PFKUNZxcpLCtk6yjMus=

4CKOs2UMhs9P8EvLAXO1Hj8aNA==

0pEGOQOa0+SOV9AnYg==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\mary.exe
      "C:\Users\Admin\AppData\Local\Temp\mary.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:900
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1252

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      927KB

      MD5

      7fd80b1cc72dc580c02ca4cfbfb2592d

      SHA1

      18da905af878b27151b359cf1a7d0a650764e8a1

      SHA256

      1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

      SHA512

      13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

    • memory/900-72-0x0000000000200000-0x0000000000210000-memory.dmp

      Filesize

      64KB

    • memory/900-66-0x0000000000AC0000-0x0000000000DC3000-memory.dmp

      Filesize

      3.0MB

    • memory/900-57-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/900-58-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/900-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/900-63-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/900-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/900-65-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/900-76-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/900-67-0x0000000000422000-0x0000000000424000-memory.dmp

      Filesize

      8KB

    • memory/900-71-0x0000000000422000-0x0000000000424000-memory.dmp

      Filesize

      8KB

    • memory/900-75-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/900-68-0x0000000000080000-0x0000000000090000-memory.dmp

      Filesize

      64KB

    • memory/968-55-0x0000000076831000-0x0000000076833000-memory.dmp

      Filesize

      8KB

    • memory/968-54-0x00000000008C0000-0x00000000008D2000-memory.dmp

      Filesize

      72KB

    • memory/968-56-0x00000000008A0000-0x00000000008AA000-memory.dmp

      Filesize

      40KB

    • memory/1284-83-0x0000000000090000-0x00000000000BD000-memory.dmp

      Filesize

      180KB

    • memory/1284-78-0x00000000005E0000-0x00000000005EE000-memory.dmp

      Filesize

      56KB

    • memory/1284-79-0x0000000000090000-0x00000000000BD000-memory.dmp

      Filesize

      180KB

    • memory/1284-80-0x0000000002150000-0x0000000002453000-memory.dmp

      Filesize

      3.0MB

    • memory/1284-81-0x0000000000980000-0x0000000000A0F000-memory.dmp

      Filesize

      572KB

    • memory/1380-82-0x00000000069C0000-0x0000000006AA7000-memory.dmp

      Filesize

      924KB

    • memory/1380-73-0x0000000006610000-0x00000000066FE000-memory.dmp

      Filesize

      952KB

    • memory/1380-84-0x00000000069C0000-0x0000000006AA7000-memory.dmp

      Filesize

      924KB

    • memory/1380-69-0x0000000004DE0000-0x0000000004ED0000-memory.dmp

      Filesize

      960KB