Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 14:41

General

  • Target

    bokledge4.1.exe

  • Size

    292KB

  • MD5

    500ce28cca98df7f3d40fa8f5e428598

  • SHA1

    83a021883ab8c45b04488074ad5f196dd5bc0de5

  • SHA256

    dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b

  • SHA512

    0a0d6267baad1b5ceec3bd6f8af771456442ea08c3750a0f811dd6bf8281fd66de3e8bdb87a5933dd455af2ab68a795c94a5e0c75e2b6f2b01fd3be207b851b7

  • SSDEEP

    6144:vYa67vB1oNb15mb3SfCt/CE76CQ1vGNJxtkxKKSZvyvB9dSuMwviPnMx5I:vYBvB1Wp8b307NruJnkxqWj4uMVPn/

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b07o

Decoy

rpalmerdecorating.co.uk

magellanalytics.net

28yorkave.com

woodburnershop.co.uk

jcw-media.com

helinica.com

yuaneju.com

akypan.top

cavidahome.com

annaswiatkowski.com

123findcapital.com

danielle.nyc

dhcons.click

ocnarf.co.uk

1wowoc.top

corbett.one

extersolutions.com

fcukart.com

fadaona.online

guangness.top

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\bokledge4.1.exe
      "C:\Users\Admin\AppData\Local\Temp\bokledge4.1.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe
        "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe" C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe
          "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2268
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"
        3⤵
          PID:5024

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

      Filesize

      139KB

      MD5

      39e740ff4e6fb6f21830aedff351d66a

      SHA1

      24211bcc5a5caaa5f5fccaa145017cf1266b7e29

      SHA256

      670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

      SHA512

      89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

    • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

      Filesize

      139KB

      MD5

      39e740ff4e6fb6f21830aedff351d66a

      SHA1

      24211bcc5a5caaa5f5fccaa145017cf1266b7e29

      SHA256

      670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

      SHA512

      89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

    • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

      Filesize

      139KB

      MD5

      39e740ff4e6fb6f21830aedff351d66a

      SHA1

      24211bcc5a5caaa5f5fccaa145017cf1266b7e29

      SHA256

      670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

      SHA512

      89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

    • C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i

      Filesize

      5KB

      MD5

      b6ff144e77e74f6cdea0365ee31214e7

      SHA1

      50efae8cc2ff6cddf822bd9f330e486cd4252ca8

      SHA256

      614bbeeede1a2ec9afd7ab98e38ed80f807d7b64214c0ab52b900fb055202ce6

      SHA512

      b7303e9e911dbe26f1efe5308b6e537bdfe93427ba4c3494ffdbb7ae1d1779e01ba3386eba13eac7f724e4510e107a619a0977b90514264d99c7de4230402c39

    • C:\Users\Admin\AppData\Local\Temp\slfnfzw.gd

      Filesize

      205KB

      MD5

      3cde900bd825c044f5c2690334fa0f1f

      SHA1

      e0c1a63300eb6cc94940a5eea200b0af8a82c6e5

      SHA256

      f69c5f49d387c16b28ea47a859f83327080d7415cf46354004ac7c6f4976bebe

      SHA512

      28af4f4cde12e2e0d6340a1cb52aa4a1824be05c0549cfe409b0b5ee56233d7a134536650f98475573185679f5aa6dd792ff6f012a1d70a0ca9d4d416324ae61

    • memory/512-151-0x0000000000F80000-0x0000000000FAF000-memory.dmp

      Filesize

      188KB

    • memory/512-149-0x0000000001700000-0x0000000001793000-memory.dmp

      Filesize

      588KB

    • memory/512-148-0x0000000000F80000-0x0000000000FAF000-memory.dmp

      Filesize

      188KB

    • memory/512-147-0x00000000018B0000-0x0000000001BFA000-memory.dmp

      Filesize

      3.3MB

    • memory/512-146-0x0000000000DD0000-0x0000000000DDB000-memory.dmp

      Filesize

      44KB

    • memory/700-142-0x0000000003170000-0x000000000322C000-memory.dmp

      Filesize

      752KB

    • memory/700-150-0x0000000008580000-0x0000000008700000-memory.dmp

      Filesize

      1.5MB

    • memory/700-152-0x0000000008580000-0x0000000008700000-memory.dmp

      Filesize

      1.5MB

    • memory/2268-144-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2268-141-0x0000000001540000-0x0000000001554000-memory.dmp

      Filesize

      80KB

    • memory/2268-140-0x0000000001580000-0x00000000018CA000-memory.dmp

      Filesize

      3.3MB

    • memory/2268-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB