Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/11/2022, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
829KB
-
MD5
714adc41d77ffc1c073ea4f3d5828afa
-
SHA1
a66bf6d42057d3a160da463aed3cfd6e415080b9
-
SHA256
7845453819c89f24416bfa15744e3625fafb7544d5beb180f6fe02a4d639b227
-
SHA512
1cdb32f0e96a4a2f0b7a86886625f2f489e9f2958f49f2874cb00730475c81c7621590e0ddc4e9f5cb6d575bf46d3a6f7278e14c823c06d58312f64747cbf506
-
SSDEEP
12288:lD6qh8oeR7yYPpMCK2pnA7LO//Vn2mkXoej2S4GgJT9rlLFiNX4xWg:4qhsdyspMCAf6tTkClJ1SNXj
Malware Config
Extracted
formbook
4.1
g2fg
snowcrash.website
pointman.us
newheartvalve.care
drandl.com
sandspringsramblers.com
programagubernamental.online
boja.us
mvrsnike.com
mentallyillmotherhood.com
facom.us
programagubernamental.store
izivente.com
roller-v.fr
amazonbioactives.com
metaverseapple.xyz
5gt-mobilevsverizon.com
gtwebsolutions.co
scottdunn.life
usdp.trade
pikmin.run
cardano-dogs.com
bf2hgfy.xyz
teslafoot.com
rubertquintana.com
wellsfargroewards.com
santel.us
couponatonline.com
theunitedhomeland.com
pmstnly.com
strlocal.com
shelleysmucker.com
youser.online
emansdesign.com
usnikeshoesbot.top
starfish.press
scotwork.us
metamorgana.com
onyxbx.net
rivas.company
firstcoastalfb.com
onpurposetraumainformedcare.com
celimot.xyz
jecunikepemej.rest
lenovolatenightit.com
unitedsterlingcompanyky.com
safety2venture.us
facebookismetanow.com
scottdunn.review
mentallyillmotherhood.com
firstincargo.com
vikavivi.com
investmenofpairs.club
nexans.cloud
farcloud.fr
ivermectinforhumans.quest
5gmalesdf.sbs
majenta.info
6vvvvvwmetam.top
metafirstclass.com
firstcoinnews.com
btcetffutures.online
funinfortmyers.com
mangoirslk.top
metaversebasicprivacy.com
blancheshelley.xyz
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1892-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1892-69-0x000000000041F160-mapping.dmp formbook behavioral1/memory/1892-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1416-79-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/1416-84-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1076 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1196 set thread context of 1892 1196 tmp.exe 31 PID 1892 set thread context of 1388 1892 tmp.exe 15 PID 1416 set thread context of 1388 1416 chkdsk.exe 15 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1728 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2012 powershell.exe 1892 tmp.exe 1892 tmp.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe 1416 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1892 tmp.exe 1892 tmp.exe 1892 tmp.exe 1416 chkdsk.exe 1416 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 1892 tmp.exe Token: SeDebugPrivilege 1416 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2012 1196 tmp.exe 27 PID 1196 wrote to memory of 2012 1196 tmp.exe 27 PID 1196 wrote to memory of 2012 1196 tmp.exe 27 PID 1196 wrote to memory of 2012 1196 tmp.exe 27 PID 1196 wrote to memory of 1728 1196 tmp.exe 29 PID 1196 wrote to memory of 1728 1196 tmp.exe 29 PID 1196 wrote to memory of 1728 1196 tmp.exe 29 PID 1196 wrote to memory of 1728 1196 tmp.exe 29 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1196 wrote to memory of 1892 1196 tmp.exe 31 PID 1388 wrote to memory of 1416 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1416 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1416 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1416 1388 Explorer.EXE 32 PID 1416 wrote to memory of 1076 1416 chkdsk.exe 33 PID 1416 wrote to memory of 1076 1416 chkdsk.exe 33 PID 1416 wrote to memory of 1076 1416 chkdsk.exe 33 PID 1416 wrote to memory of 1076 1416 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GRyjdWVvupydl.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GRyjdWVvupydl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAEB7.tmp"3⤵
- Creates scheduled task(s)
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Deletes itself
PID:1076
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59ddaeb70c4e0bfd8f90d8434a04b8c57
SHA1815533599df9f59882f89a3913b7ce7b782f4a91
SHA256ffb9463998565de673d8c92386a8a511559c882d1b4e1baf0ff8f0052a1d9f4a
SHA512d7e693cc901fb9d34051a6aeeee6e6951913cf859dbf710a6ee181918a6b799b008771c65d4e82dcaaf0aa60b8919e9f480964192da595d9eaf81d6ed4c3a18d