Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/05/2023, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
order specification.exe
Resource
win7-20230220-en
General
-
Target
order specification.exe
-
Size
684KB
-
MD5
e4b4f25fdbd4a82ef0df9076ec6dd250
-
SHA1
35a27a55da6c5c6c65292289d95469cd4ec0bff9
-
SHA256
0480f30f1070d12b3231c495ee15699f09049f1c5bc19e889ebd2f3571bd4ab7
-
SHA512
848f2178541a9302e93c3558f0320bc5d922128407b03dbfaa20702584fc67e1722f4ac46974ad8a7b918af2d78fd86903728d518ec2f5f4d66bb74474347902
-
SSDEEP
12288:ptOFx0YPX/NqPsAogO01MnY7Zzrgb7Siqumatg8BaNd2h/:ptOwHPsAA0eGgb+iquBaNG/
Malware Config
Extracted
formbook
4.1
o17i
chocolatebarreview.com
fetch-a-trabajos-canada.info
expresspestcontrol.net
tractionx.co.uk
vitalassetsecurity.com
lahtawine.ru
firedamagereports.com
bentzenphotography.com
digitalworkforces.com
divnoe.online
efefbig.buzz
melhardy.co.uk
igorsolutions.com
developmentszhuiservice.com
fookspace.com
kredaroo.com
4zpm.xyz
kycecat.cfd
singingriverhomeimprovement.com
bils.store
abvqwrtqwt.com
agenciaibdig.online
azsxslife.com
deadstar.cloud
dralexisdvm.com
investea.uk
lovemichigancity.com
imcas.academy
cicero.store
handgab.com
femalefinancialcollective.com
fullblu.com
betonbajas.info
olawaleojewumi.africa
chrissyadamsrealestate.com
kx1898.com
efefcoal.buzz
cartec-2023.com
laptops-67575.com
gadexperts.com
clients-web.com
wwwinterbahis1075.com
locvu.xyz
ctjh0p9.vip
loyaltysouls.com
gction.online
funerverso.net
chargingpiles.shop
gyekkh.cfd
38jsz.com
drdoctormedia.com
732694.com
usapaperballot.com
apexbiomedicaltech.com
knowchaos.com
shaedonaldson.net
76999.biz
doitalllandscapingllc.com
compts.top
fuelforhealth.se
gofundhouse.com
vapecanal.co.uk
furniturecomponent.asia
searo.co.uk
internet-providers-45067.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/816-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1784-73-0x0000000002390000-0x00000000023D0000-memory.dmp formbook behavioral1/memory/816-74-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/908-82-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/908-84-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1776 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 904 set thread context of 816 904 order specification.exe 31 PID 816 set thread context of 1180 816 order specification.exe 14 PID 908 set thread context of 1180 908 help.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 816 order specification.exe 1784 powershell.exe 816 order specification.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe 908 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1180 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 816 order specification.exe 816 order specification.exe 816 order specification.exe 908 help.exe 908 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1784 powershell.exe Token: SeDebugPrivilege 816 order specification.exe Token: SeDebugPrivilege 908 help.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1180 Explorer.EXE 1180 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1180 Explorer.EXE 1180 Explorer.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 904 wrote to memory of 1784 904 order specification.exe 27 PID 904 wrote to memory of 1784 904 order specification.exe 27 PID 904 wrote to memory of 1784 904 order specification.exe 27 PID 904 wrote to memory of 1784 904 order specification.exe 27 PID 904 wrote to memory of 1636 904 order specification.exe 29 PID 904 wrote to memory of 1636 904 order specification.exe 29 PID 904 wrote to memory of 1636 904 order specification.exe 29 PID 904 wrote to memory of 1636 904 order specification.exe 29 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 904 wrote to memory of 816 904 order specification.exe 31 PID 1180 wrote to memory of 908 1180 Explorer.EXE 32 PID 1180 wrote to memory of 908 1180 Explorer.EXE 32 PID 1180 wrote to memory of 908 1180 Explorer.EXE 32 PID 1180 wrote to memory of 908 1180 Explorer.EXE 32 PID 908 wrote to memory of 1776 908 help.exe 33 PID 908 wrote to memory of 1776 908 help.exe 33 PID 908 wrote to memory of 1776 908 help.exe 33 PID 908 wrote to memory of 1776 908 help.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\order specification.exe"C:\Users\Admin\AppData\Local\Temp\order specification.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ShUpVIVzyjGX.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ShUpVIVzyjGX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1D6.tmp"3⤵
- Creates scheduled task(s)
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\order specification.exe"C:\Users\Admin\AppData\Local\Temp\order specification.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\order specification.exe"3⤵
- Deletes itself
PID:1776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56c4dfe2d25d755cb7db7ae6c4764b857
SHA18bcb77513b0f9292d9cbc0d5e76d70f82e43faac
SHA256d23350d60fb5e01ef2ba97a1542011eda82b866ecb68eba52cb0e60e33da0660
SHA5125547bef1a71e061625dccfde840fa9653b4b4556994ccc0ac315b03b0d4dc2cec2b0d0f808abfbaeee58964ad07f0aef73b7dac62d1af43ffc203a812c2820f4