Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/04/2023, 17:58

General

  • Target

    New order list_pdf.exe

  • Size

    260KB

  • MD5

    9db995a644af18837b503d2d9a33bdec

  • SHA1

    c06cd0c6e3cdfbbe49f85765335ce9eff4500edd

  • SHA256

    dd4311e439da8393afbb51dc192317d6cd5a53b9d574971adb768c38a2bf3d71

  • SHA512

    5c857e420be06475c1ef7ae2294f90b6eac5da0c78bcc15aa0a2284a5ab184711b6a72bfdf06fbfcb5afcebbc105466493373a208a76be8000d76777ad318fa0

  • SSDEEP

    6144:/Ya6LZk8ky9q604SngQ2SLljDavgmtLGdBdMW4Tem7lZfhS:/YJZ726fSgQ2SLcvRtw85lFg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hs95

Decoy

capitalpartnersintl.com

learnotctrading.africa

kokotripbali.click

laserelitecreations.com

55522.voto

hezop.xyz

6n992.com

aelh3s.shop

victmcomssioner.org.uk

7xwithlove.com

gregdf.click

thewarehouseconsultants.africa

ilbufalaro.online

bulkcheapstamps.com

etismc.top

beautyby-eve.com

dabopixel.com

freddybrowne-17.com

heat-pumps-11472.com

cleaningbyeve.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\New order list_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\New order list_pdf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\otvme.exe
        "C:\Users\Admin\AppData\Local\Temp\otvme.exe" C:\Users\Admin\AppData\Local\Temp\irayhlq.rxs
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\otvme.exe
          "C:\Users\Admin\AppData\Local\Temp\otvme.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1036
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\otvme.exe"
        3⤵
          PID:984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\irayhlq.rxs

      Filesize

      6KB

      MD5

      0a78b16f782ae1d6b77a0ad2ef477189

      SHA1

      b3ea8bc878553722253f13270ab5835e53ffe807

      SHA256

      22519b6efe6c76c449ae52af794e6f60190d0727b7c21aa332c8cf01b5c10dd2

      SHA512

      b7d3bef545f59ea6b8dcc21d4aad484d8476d5d8d4f278f9a9c75c9b2bf366445a20cb83ff74b0cbcf4d55b1c67e3080f9e5a618ff67550034a9595336ccd2f8

    • C:\Users\Admin\AppData\Local\Temp\moducnulp.ytt

      Filesize

      205KB

      MD5

      989d53616919dbe2defed3f2d35d570a

      SHA1

      21fec5cefaaba32b80884cd5809766821fc12ba9

      SHA256

      fbcca8d8452467f436b694e64525657e24cdcd27138f5797789d7c6ea2290555

      SHA512

      630c84d15a4db084d1d30958a2bed6c360ace9a4768a2dbe34684ae5fa42604d2787986a26ed1b8df4a4ce0e7766f46d9441fc67af2907328c7a9f8befbd26de

    • C:\Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • C:\Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • C:\Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • C:\Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • \Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • \Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • \Users\Admin\AppData\Local\Temp\otvme.exe

      Filesize

      53KB

      MD5

      ea0232bab33c6cd61b7eee5de64f895a

      SHA1

      64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

      SHA256

      0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

      SHA512

      b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

    • memory/1036-74-0x0000000000330000-0x0000000000345000-memory.dmp

      Filesize

      84KB

    • memory/1036-72-0x0000000000900000-0x0000000000C03000-memory.dmp

      Filesize

      3.0MB

    • memory/1036-73-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1036-68-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1208-84-0x0000000002A90000-0x0000000002B90000-memory.dmp

      Filesize

      1024KB

    • memory/1208-75-0x0000000006270000-0x0000000006373000-memory.dmp

      Filesize

      1.0MB

    • memory/1208-86-0x0000000006510000-0x0000000006633000-memory.dmp

      Filesize

      1.1MB

    • memory/1208-87-0x0000000006510000-0x0000000006633000-memory.dmp

      Filesize

      1.1MB

    • memory/1208-89-0x0000000006510000-0x0000000006633000-memory.dmp

      Filesize

      1.1MB

    • memory/1496-77-0x0000000000D80000-0x0000000000E84000-memory.dmp

      Filesize

      1.0MB

    • memory/1496-79-0x0000000000D80000-0x0000000000E84000-memory.dmp

      Filesize

      1.0MB

    • memory/1496-80-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/1496-81-0x0000000002290000-0x0000000002593000-memory.dmp

      Filesize

      3.0MB

    • memory/1496-82-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/1496-85-0x0000000000920000-0x00000000009B4000-memory.dmp

      Filesize

      592KB