Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    31/10/2022, 10:58

General

  • Target

    ungziped_file.exe

  • Size

    224KB

  • MD5

    c7eac5a7087af67171d5515c27d6f927

  • SHA1

    3e036ca39fab2b5e47aa297b5951954ac45dc6f6

  • SHA256

    0e00f12317743737906e4779e5a936985e8ee76a8254a7ef81f67a5509e9f524

  • SHA512

    cd8f759a09101917d053cbcf3a2269709711e959ac7c655813b8d288da6a507fedd42b06f9fc5a7e17298607543317ccf3fde2754ac7c0120d3513558ac071d5

  • SSDEEP

    6144:qweEpSKY3hdH6CVjlmaEJlnXEGkCnFSN6xZkfpNvpJ:bSN6mlFm0GkiCSChNj

Malware Config

Extracted

Family

formbook

Campaign

0nta

Decoy

gbsCquDKPUb+i0Rm

eccFwzyxeEotI8Ul4YIzPg==

bdsn2Sl9Bol+2aFJ6MKrx3NcrN+kLrA=

SLPEtzgs6DQUEdHiW3vibToq

Bl967wbymDrsQ18=

BWvuZozwNlwVYjPGv4hDOw==

L5nwqf9dGOOqwX+MGq2BhkBzz+ne

X6uAMol2Y9eex43gdg4=

0jFwFmPSjKJeT0s=

O3q7eQw18Jxs

R6HrqxiWheCCueVv

K2V+CD6jnKBbVPYHy89ho8I=

YLcAq+U9+uDgOfvdLvzp

kQPCgwDontKJxI3gdg4=

aeIPy0axLpNaaA52M8aGxaNE/Qk=

9T97HXSZjG1l

Nm9n0uvKQ0j+i0Rm

DIKJzOFACPe0LwgytIse0U/TqkgGhA==

Ya+2H09GvMXEEiy/0GLibToq

cruIS/BVRkv8+LjVkzTibToq

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\ungziped_file.exe
      "C:\Users\Admin\AppData\Local\Temp\ungziped_file.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Users\Admin\AppData\Local\Temp\gzngw.exe
        "C:\Users\Admin\AppData\Local\Temp\gzngw.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1080
        • C:\Users\Admin\AppData\Local\Temp\gzngw.exe
          "C:\Users\Admin\AppData\Local\Temp\gzngw.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2028
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1072

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dugjm.px

      Filesize

      185KB

      MD5

      58f883c6ade9799e5ea410b3000e380d

      SHA1

      9f21c9484b58a2de5bf9b11f326b0b709353fe3a

      SHA256

      10dc6aac229a480f48405dcce09639ea8d2d520c914716156bc0c6776b448284

      SHA512

      ba355cff6a814d64b4b45cd1aed7d345c8e05988569802b87493e32cbccca715fc2d7d6fad46656b2b41c7c7ad2f47a7ef07c5617a954d37be5488a14f5e9b63

    • C:\Users\Admin\AppData\Local\Temp\gzngw.exe

      Filesize

      5KB

      MD5

      0fcdb62de7d35829dfa51b6d6ee9f2e6

      SHA1

      338ee367b5e6f680934672d8084809b267e84304

      SHA256

      cc08335d8d4f76c90e782adfe5e5bc66720edd7f841f261b6fb6586872cde093

      SHA512

      acf9e17527716f5d50a8be7139e88d918fa92b6ac3a88c1323fe21398a8da505b1a8d3623dddc12b4d02bdab2eef7419973d46542c9b076cc5ff6d4210ba79da

    • C:\Users\Admin\AppData\Local\Temp\gzngw.exe

      Filesize

      5KB

      MD5

      0fcdb62de7d35829dfa51b6d6ee9f2e6

      SHA1

      338ee367b5e6f680934672d8084809b267e84304

      SHA256

      cc08335d8d4f76c90e782adfe5e5bc66720edd7f841f261b6fb6586872cde093

      SHA512

      acf9e17527716f5d50a8be7139e88d918fa92b6ac3a88c1323fe21398a8da505b1a8d3623dddc12b4d02bdab2eef7419973d46542c9b076cc5ff6d4210ba79da

    • C:\Users\Admin\AppData\Local\Temp\gzngw.exe

      Filesize

      5KB

      MD5

      0fcdb62de7d35829dfa51b6d6ee9f2e6

      SHA1

      338ee367b5e6f680934672d8084809b267e84304

      SHA256

      cc08335d8d4f76c90e782adfe5e5bc66720edd7f841f261b6fb6586872cde093

      SHA512

      acf9e17527716f5d50a8be7139e88d918fa92b6ac3a88c1323fe21398a8da505b1a8d3623dddc12b4d02bdab2eef7419973d46542c9b076cc5ff6d4210ba79da

    • C:\Users\Admin\AppData\Local\Temp\tlmne.rd

      Filesize

      5KB

      MD5

      0a582f0b283ddea2dac9a3d70f712070

      SHA1

      4c0aadceaf3a25aabc134a374ef21119683d224d

      SHA256

      dd186c1fb47b9f205068862c9b44bf831b36a2576dfa5bf2185d0ef9d34a3d32

      SHA512

      16c3716300eb0c4ef35eb78167239d103bc3e948d6419efb1cb3ceb4b3ca25222085aa8a70e8feb0b3cebd9055ead1eb1475cd423cf9ea9f80f2092a437bcf97

    • \Users\Admin\AppData\Local\Temp\gzngw.exe

      Filesize

      5KB

      MD5

      0fcdb62de7d35829dfa51b6d6ee9f2e6

      SHA1

      338ee367b5e6f680934672d8084809b267e84304

      SHA256

      cc08335d8d4f76c90e782adfe5e5bc66720edd7f841f261b6fb6586872cde093

      SHA512

      acf9e17527716f5d50a8be7139e88d918fa92b6ac3a88c1323fe21398a8da505b1a8d3623dddc12b4d02bdab2eef7419973d46542c9b076cc5ff6d4210ba79da

    • \Users\Admin\AppData\Local\Temp\gzngw.exe

      Filesize

      5KB

      MD5

      0fcdb62de7d35829dfa51b6d6ee9f2e6

      SHA1

      338ee367b5e6f680934672d8084809b267e84304

      SHA256

      cc08335d8d4f76c90e782adfe5e5bc66720edd7f841f261b6fb6586872cde093

      SHA512

      acf9e17527716f5d50a8be7139e88d918fa92b6ac3a88c1323fe21398a8da505b1a8d3623dddc12b4d02bdab2eef7419973d46542c9b076cc5ff6d4210ba79da

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      932KB

      MD5

      661fd92d4eaeea3740649af5a484d7c8

      SHA1

      c93f868890fee1475f8ec9e7607e26f5dce67d54

      SHA256

      58a478f0560ea22c1bc194263f07cf6f3ecfe47d0c8b534a7bba185f28a1141f

      SHA512

      1fac03c20139fde41d121e0adbd02d127261ce061509996087fc1c80baf2fe0d0f70fed6b83d38a85cfa2e07d038ff809161c7ecce31ec44ac8b89740d3db15d

    • memory/884-72-0x00000000007A0000-0x0000000000AA3000-memory.dmp

      Filesize

      3.0MB

    • memory/884-73-0x00000000005F0000-0x000000000067F000-memory.dmp

      Filesize

      572KB

    • memory/884-75-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/884-70-0x0000000000AC0000-0x0000000000AC6000-memory.dmp

      Filesize

      24KB

    • memory/884-71-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/1200-76-0x0000000007540000-0x00000000076A0000-memory.dmp

      Filesize

      1.4MB

    • memory/1200-74-0x0000000007540000-0x00000000076A0000-memory.dmp

      Filesize

      1.4MB

    • memory/1200-68-0x0000000004E00000-0x0000000004EEE000-memory.dmp

      Filesize

      952KB

    • memory/1292-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

      Filesize

      8KB

    • memory/2028-67-0x00000000002A0000-0x00000000002B0000-memory.dmp

      Filesize

      64KB

    • memory/2028-66-0x0000000000970000-0x0000000000C73000-memory.dmp

      Filesize

      3.0MB

    • memory/2028-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2028-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB