Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
372daff38ea8b876b01803b474c7f687.exe
Resource
win7-20230220-en
General
-
Target
372daff38ea8b876b01803b474c7f687.exe
-
Size
906KB
-
MD5
372daff38ea8b876b01803b474c7f687
-
SHA1
3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf
-
SHA256
625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c
-
SHA512
9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6
-
SSDEEP
24576:C0t8P0kqs+kTIvMRGfdx9YLXy+DB87qkC:IP01sWMRGfHuXy+Dx
Malware Config
Extracted
formbook
4.1
gg04
clothandsoulfabricllc.com
kx1336.com
4638.global
fixlaunchcredtunionmemb.online
indivexport.com
betuluzun.online
colossusboutique.com
hgcst.com
authorizer.online
hong-travel.com
globalwealthstrategiesco.com
fobberq.com
tribally.net
cook-a.com
todipjane.africa
membershipexams.africa
3dseal.online
abris-spb.ru
mkkkkk.net
chargecentral.store
chaudhrytraders.com
kooperatifemlak.com
cutematxhy.com
kasoraenterprises.com
juicydisco.app
bryconbenefits.com
kaleebet955.xyz
gfxadeel.tech
hanyawiki.xyz
vineuse.co.uk
dgoguincho.net
kngm-metall.ru
anime-room.com
clients-web.com
freeadmissiontickets.com
ctxlab.online
ds85.top
glossaryfashions.com
threesome.africa
invictusbr.online
dinyu001.com
cilumer.com
internationalfreight.tech
choicetricker.com
lukasladistores.africa
data-analyticsdegree.com
downloadtemplate.site
acebit.xyz
sunliftathleisure.com
socialunites.org.uk
4483.uk
aboutmeclothes.online
lovetext.africa
luieshop.com
xn--opoderosodogo-7eb.app
buggsfurniture.com
fanslylove.com
estockuk.co.uk
linkonweb.com
customscubadiving.com
sxcontu.xyz
thetobacconist.africa
africansinuk.co.uk
havenadvisorypartners.net
coquitoweek.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/664-64-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 664 372daff38ea8b876b01803b474c7f687.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28 PID 2044 wrote to memory of 664 2044 372daff38ea8b876b01803b474c7f687.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"C:\Users\Admin\AppData\Local\Temp\372daff38ea8b876b01803b474c7f687.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-