Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    45s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2023, 01:14

General

  • Target

    372daff38ea8b876b01803b474c7f687.exe

  • Size

    906KB

  • MD5

    372daff38ea8b876b01803b474c7f687

  • SHA1

    3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf

  • SHA256

    625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c

  • SHA512

    9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6

  • SSDEEP

    24576:C0t8P0kqs+kTIvMRGfdx9YLXy+DB87qkC:IP01sWMRGfHuXy+Dx

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gg04

Decoy

clothandsoulfabricllc.com

kx1336.com

4638.global

fixlaunchcredtunionmemb.online

indivexport.com

betuluzun.online

colossusboutique.com

hgcst.com

authorizer.online

hong-travel.com

globalwealthstrategiesco.com

fobberq.com

tribally.net

cook-a.com

todipjane.africa

membershipexams.africa

3dseal.online

abris-spb.ru

mkkkkk.net

chargecentral.store

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe
    "C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe
      "C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/664-61-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/664-62-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/664-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/664-64-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/664-65-0x0000000000970000-0x0000000000C73000-memory.dmp

    Filesize

    3.0MB

  • memory/2044-54-0x00000000002F0000-0x00000000003D8000-memory.dmp

    Filesize

    928KB

  • memory/2044-55-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/2044-56-0x0000000000450000-0x0000000000460000-memory.dmp

    Filesize

    64KB

  • memory/2044-57-0x00000000003E0000-0x0000000000420000-memory.dmp

    Filesize

    256KB

  • memory/2044-58-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/2044-59-0x0000000005940000-0x00000000059DC000-memory.dmp

    Filesize

    624KB

  • memory/2044-60-0x0000000004C20000-0x0000000004C84000-memory.dmp

    Filesize

    400KB