Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2023, 16:08

General

  • Target

    Swift Copy.exe

  • Size

    668KB

  • MD5

    3c5bcd6427bdec6f9dc27f22123322a3

  • SHA1

    62d8f3e059e55e55ea27de88947689f06cc2551f

  • SHA256

    b9bdf17b0783f5b073ba007091604c0407e825b17ae8ae90bf53d2a2140341ba

  • SHA512

    672248efce41e4eace1901cdba6716b915e3c58c559f4cc1f24b7ec9adb7e8f13db44830729561177cc216fa8eaff31ca47faccb27d60fc620ee051a4123d114

  • SSDEEP

    12288:U6whh2Y4Y8WfDrYfGJ68qDC1Hei74I+9:vwhh2fqrYfGJvqD2P7

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m82

Decoy

jamesdevereux.com

artificialturfminneapolis.com

hongmeiyan.com

lojaderoupasbr.com

yit.africa

austinrelocationexpert.com

saiva.page

exitsategy.com

chochonux.com

klosterbraeu-unterliezheim.com

byseymanur.com

sblwarwickshire.co.uk

brazimaid.com

ciogame.com

bronzesailing.com

dwkapl.xyz

022dyd.com

compassandpathwriting.com

alphabet1x.com

selfcleaninghairbrush.co.uk

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe
      "C:\Users\Admin\AppData\Local\Temp\Swift Copy.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1080
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:4032
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:3576
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:2628
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            2⤵
              PID:5052
            • C:\Windows\SysWOW64\autofmt.exe
              "C:\Windows\SysWOW64\autofmt.exe"
              2⤵
                PID:5092
              • C:\Windows\SysWOW64\autofmt.exe
                "C:\Windows\SysWOW64\autofmt.exe"
                2⤵
                  PID:4428
                • C:\Windows\SysWOW64\NETSTAT.EXE
                  "C:\Windows\SysWOW64\NETSTAT.EXE"
                  2⤵
                  • Suspicious use of SetThreadContext
                  • Gathers network information
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4216
                  • C:\Windows\SysWOW64\cmd.exe
                    /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                    3⤵
                      PID:2784

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1080-146-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/1080-150-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/1080-147-0x00000000031A0000-0x00000000031B5000-memory.dmp

                  Filesize

                  84KB

                • memory/1080-140-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/1080-143-0x0000000001400000-0x000000000174A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/1080-144-0x0000000001870000-0x0000000001885000-memory.dmp

                  Filesize

                  84KB

                • memory/3180-160-0x0000000008150000-0x0000000008263000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3180-158-0x0000000008150000-0x0000000008263000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3180-157-0x0000000008150000-0x0000000008263000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3180-148-0x0000000006D40000-0x0000000006E57000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3180-145-0x0000000006C20000-0x0000000006D34000-memory.dmp

                  Filesize

                  1.1MB

                • memory/4216-153-0x00000000019E0000-0x0000000001D2A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4216-149-0x0000000000080000-0x000000000008B000-memory.dmp

                  Filesize

                  44KB

                • memory/4216-151-0x0000000000080000-0x000000000008B000-memory.dmp

                  Filesize

                  44KB

                • memory/4216-152-0x0000000001200000-0x000000000122F000-memory.dmp

                  Filesize

                  188KB

                • memory/4216-154-0x0000000001200000-0x000000000122F000-memory.dmp

                  Filesize

                  188KB

                • memory/4216-156-0x0000000001750000-0x00000000017E4000-memory.dmp

                  Filesize

                  592KB

                • memory/4380-139-0x0000000008080000-0x000000000811C000-memory.dmp

                  Filesize

                  624KB

                • memory/4380-138-0x0000000004F70000-0x0000000004F80000-memory.dmp

                  Filesize

                  64KB

                • memory/4380-137-0x0000000004F70000-0x0000000004F80000-memory.dmp

                  Filesize

                  64KB

                • memory/4380-133-0x0000000000320000-0x00000000003CE000-memory.dmp

                  Filesize

                  696KB

                • memory/4380-136-0x0000000004F30000-0x0000000004F3A000-memory.dmp

                  Filesize

                  40KB

                • memory/4380-135-0x0000000004D90000-0x0000000004E22000-memory.dmp

                  Filesize

                  584KB

                • memory/4380-134-0x0000000005260000-0x0000000005804000-memory.dmp

                  Filesize

                  5.6MB