Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 14:22

General

  • Target

    ef0ceab01e813f995915d6c596bd663a469928024e9295b093388a4a7215bb1d.exe

  • Size

    694KB

  • MD5

    c4523a20a3e46acad92e1cb38adc378b

  • SHA1

    3f239f11ee2a8728cc65266111abbf64b1f8dc53

  • SHA256

    ef0ceab01e813f995915d6c596bd663a469928024e9295b093388a4a7215bb1d

  • SHA512

    4b0c6c0615b8c16583e21e7b68ec5c38e0f5ac1f480f3308d5734ce598836a2e27a80e2959458690ee9dcd7544ece9fad7e23b6c0356784524d6e0e439b4162b

  • SSDEEP

    6144:rEa0dpkNz07AFqV57lNO4/mq3kl9SK5WO+Dg/Fb5aHDiTBfA+RhdUx9:Y57lNPmikl9SK5WAHkDiT5AshOf

Malware Config

Extracted

Family

formbook

Campaign

54ut

Decoy

1DeiXmzDLw+mW17NwLBXpXM=

Nouf/qArBV5GAPfIhxWPkDFrVQ==

9OCYganx4VaCX1EY/sUSfRDLx6s=

xh8rlilJ/SGckKI=

HGyA64YZyhUs3jvzno2F

yx7/XhxTuRiTcnLKrrOOXTrpW60=

ZYI6IbtcBFx+OpnLU0nXmw==

MhgenS1xYWYThQgS+A==

s0ada4bHHvtWWbYb

2/4IbaW+Ljsy6Ujzno2F

Z5WdKMj5YLgpH0ypdTEcLe2W/lf7j6Io

xXTmzNjzpvUMwTAHwYv2kw==

kcbnSAS0pkV2G1fXsFktVxiXmLTktXY=

PU0V5f0rnqjEhQgS+A==

Z8aNX4Sm/dbGhQgS+A==

s4bq4W4D4UJdYqqvU0nXmw==

a56Z6W0Asvwh3jzzno2F

Qmhm+fY3o6bEhQgS+A==

WIFCKZ/ZO+dCwTAHwYv2kw==

Nqjne5GxXbzY1f3Qp2rBkDFrVQ==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef0ceab01e813f995915d6c596bd663a469928024e9295b093388a4a7215bb1d.exe
    "C:\Users\Admin\AppData\Local\Temp\ef0ceab01e813f995915d6c596bd663a469928024e9295b093388a4a7215bb1d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe
      "C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe" C:\Users\Admin\AppData\Local\Temp\fxecd.cy
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe
        "C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe" C:\Users\Admin\AppData\Local\Temp\fxecd.cy
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4720

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\djpudrw.ffl

      Filesize

      185KB

      MD5

      410b0e1ae9265692e672430d50b4e5f7

      SHA1

      8f7daade2c549fec9a613cad851ed60c1ec36f91

      SHA256

      cf7799eb914a83e85c6398bd8ac13e2a57332a14f25997a202e235e984516811

      SHA512

      eaa83e351ca83bd93686c6b54279a2b4a93982f8e2d2b59d7e1feddd3b83170bee762191c0a5649f0f41b809fd50ce7d8d78db057c98e1fc90d5035d372f3fc3

    • C:\Users\Admin\AppData\Local\Temp\fxecd.cy

      Filesize

      5KB

      MD5

      e42eae76e993fb2928e526c735624d6c

      SHA1

      f439caeec2b4f48ffa25c02d51582e043efb08dd

      SHA256

      7d3d7d5483525526ee245c09cbefe52f8be767d1eeaa598012460da43bdbba01

      SHA512

      3d64e45dc510520aa586cbaae77721d572431e8c66a9a2d1aef5ade9e53af958688609f81f87d02228cc7feb5aa0b26163e3b4a47d0a22e52b2f3c05fc25f8e2

    • C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe

      Filesize

      91KB

      MD5

      3a76c89356dc6d77e58b960ca72042c6

      SHA1

      2871a87aa6187ab32099f7b25341bb70fae1d972

      SHA256

      ff76ab009b21cf1f949a747aaf83e3232ea253f69ff04720cc66401405c831a7

      SHA512

      2dedf92c6ded4b991e561bae465bbb449acd0ba99c94d5bb186b9bc14b8c18cc17e7f2f63506f5e52744838f60741f3cc137cf51ffb441212ce8606dd4b89673

    • C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe

      Filesize

      91KB

      MD5

      3a76c89356dc6d77e58b960ca72042c6

      SHA1

      2871a87aa6187ab32099f7b25341bb70fae1d972

      SHA256

      ff76ab009b21cf1f949a747aaf83e3232ea253f69ff04720cc66401405c831a7

      SHA512

      2dedf92c6ded4b991e561bae465bbb449acd0ba99c94d5bb186b9bc14b8c18cc17e7f2f63506f5e52744838f60741f3cc137cf51ffb441212ce8606dd4b89673

    • C:\Users\Admin\AppData\Local\Temp\lxwjyyca.exe

      Filesize

      91KB

      MD5

      3a76c89356dc6d77e58b960ca72042c6

      SHA1

      2871a87aa6187ab32099f7b25341bb70fae1d972

      SHA256

      ff76ab009b21cf1f949a747aaf83e3232ea253f69ff04720cc66401405c831a7

      SHA512

      2dedf92c6ded4b991e561bae465bbb449acd0ba99c94d5bb186b9bc14b8c18cc17e7f2f63506f5e52744838f60741f3cc137cf51ffb441212ce8606dd4b89673

    • memory/760-152-0x0000000002A10000-0x0000000002AED000-memory.dmp

      Filesize

      884KB

    • memory/760-150-0x0000000002A10000-0x0000000002AED000-memory.dmp

      Filesize

      884KB

    • memory/760-144-0x0000000007E40000-0x0000000007F63000-memory.dmp

      Filesize

      1.1MB

    • memory/4276-146-0x0000000000AF0000-0x0000000000B4A000-memory.dmp

      Filesize

      360KB

    • memory/4276-151-0x0000000000D40000-0x0000000000D6D000-memory.dmp

      Filesize

      180KB

    • memory/4276-149-0x0000000001720000-0x00000000017AF000-memory.dmp

      Filesize

      572KB

    • memory/4276-148-0x0000000001980000-0x0000000001CCA000-memory.dmp

      Filesize

      3.3MB

    • memory/4276-147-0x0000000000D40000-0x0000000000D6D000-memory.dmp

      Filesize

      180KB

    • memory/4748-143-0x00000000006A0000-0x00000000006B0000-memory.dmp

      Filesize

      64KB

    • memory/4748-142-0x0000000000B10000-0x0000000000E5A000-memory.dmp

      Filesize

      3.3MB

    • memory/4748-141-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4748-140-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4748-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB