Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2022, 23:43

General

  • Target

    mary.exe

  • Size

    56KB

  • MD5

    e8bf77b057a93cafe70b86fdb9da6aed

  • SHA1

    53f70d6a1f0a48522d90e1612bdf3c4b122fc504

  • SHA256

    f53340a00d5248f81164bd5a1880698c4926cf62dc2fc5c93696f87780733b1a

  • SHA512

    56d4f69822d9790caec4d53a3112038c7b0b518c013638ad7865dbd7a5e80d3d46b4da5d6170e888f5f3ae6c58231b2c3fbc7763f3107965eedb52b05d46461f

  • SSDEEP

    768:k8s3JoK3x2Ncv+kIQZ5N9Fe6HmBouzruiRPPrk+FP:kB36I1vxIMW6HmBxuixPd

Malware Config

Extracted

Family

formbook

Campaign

bbuy

Decoy

wqbqKCTkCwjtbad3vwJI6Z+a

EqD7JRhUV2ZQDnU=

UlWd0LffZzZeGY0BzkxroA==

sAbXk3SNlPOcRleKI+k=

HCpzqZKnJGDpf+qsxnOnvQ==

vGdG6Ezu8mctzfLnmX/FLDeiPS3M

tcctT/pPwrv7mdA0aw==

Tr6fUz4Ae0mrGA==

NxZtBUfk3aqxS1eKI+k=

TSUVzyy9hBs65j7xXSRVBx+M

fObBavCu4OEt/0pTr98J

2ap9Oy1p8MQP+EtTr98J

FL4Q0TXr1iHWjezVUdQtFT4=

kSFvf2KUliCDOWwacw==

ctqtSLZvqqr/xym6xnOnvQ==

8DqrrnN58fVC

fIrZCP4xwLt7CkGppluStw==

PFKUNZxcpLCtk6yjMus=

4CKOs2UMhs9P8EvLAXO1Hj8aNA==

0pEGOQOa0+SOV9AnYg==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\mary.exe
      "C:\Users\Admin\AppData\Local\Temp\mary.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3264
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2732

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2432-142-0x00000000076F0000-0x000000000788E000-memory.dmp

      Filesize

      1.6MB

    • memory/2432-150-0x0000000007970000-0x0000000007A3C000-memory.dmp

      Filesize

      816KB

    • memory/2432-148-0x0000000007970000-0x0000000007A3C000-memory.dmp

      Filesize

      816KB

    • memory/3264-141-0x0000000001410000-0x0000000001420000-memory.dmp

      Filesize

      64KB

    • memory/3264-134-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3264-138-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/3264-139-0x0000000001980000-0x0000000001CCA000-memory.dmp

      Filesize

      3.3MB

    • memory/3264-140-0x0000000000422000-0x0000000000424000-memory.dmp

      Filesize

      8KB

    • memory/3264-136-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3264-137-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3452-132-0x0000000000DE0000-0x0000000000DF2000-memory.dmp

      Filesize

      72KB

    • memory/4672-146-0x0000000003020000-0x000000000336A000-memory.dmp

      Filesize

      3.3MB

    • memory/4672-147-0x0000000002CC0000-0x0000000002D4F000-memory.dmp

      Filesize

      572KB

    • memory/4672-145-0x0000000000D80000-0x0000000000DAD000-memory.dmp

      Filesize

      180KB

    • memory/4672-149-0x0000000000D80000-0x0000000000DAD000-memory.dmp

      Filesize

      180KB

    • memory/4672-144-0x0000000000EF0000-0x0000000000EFC000-memory.dmp

      Filesize

      48KB