Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
order specification.exe
Resource
win7-20230220-en
General
-
Target
order specification.exe
-
Size
684KB
-
MD5
e4b4f25fdbd4a82ef0df9076ec6dd250
-
SHA1
35a27a55da6c5c6c65292289d95469cd4ec0bff9
-
SHA256
0480f30f1070d12b3231c495ee15699f09049f1c5bc19e889ebd2f3571bd4ab7
-
SHA512
848f2178541a9302e93c3558f0320bc5d922128407b03dbfaa20702584fc67e1722f4ac46974ad8a7b918af2d78fd86903728d518ec2f5f4d66bb74474347902
-
SSDEEP
12288:ptOFx0YPX/NqPsAogO01MnY7Zzrgb7Siqumatg8BaNd2h/:ptOwHPsAA0eGgb+iquBaNG/
Malware Config
Extracted
formbook
4.1
o17i
chocolatebarreview.com
fetch-a-trabajos-canada.info
expresspestcontrol.net
tractionx.co.uk
vitalassetsecurity.com
lahtawine.ru
firedamagereports.com
bentzenphotography.com
digitalworkforces.com
divnoe.online
efefbig.buzz
melhardy.co.uk
igorsolutions.com
developmentszhuiservice.com
fookspace.com
kredaroo.com
4zpm.xyz
kycecat.cfd
singingriverhomeimprovement.com
bils.store
abvqwrtqwt.com
agenciaibdig.online
azsxslife.com
deadstar.cloud
dralexisdvm.com
investea.uk
lovemichigancity.com
imcas.academy
cicero.store
handgab.com
femalefinancialcollective.com
fullblu.com
betonbajas.info
olawaleojewumi.africa
chrissyadamsrealestate.com
kx1898.com
efefcoal.buzz
cartec-2023.com
laptops-67575.com
gadexperts.com
clients-web.com
wwwinterbahis1075.com
locvu.xyz
ctjh0p9.vip
loyaltysouls.com
gction.online
funerverso.net
chargingpiles.shop
gyekkh.cfd
38jsz.com
drdoctormedia.com
732694.com
usapaperballot.com
apexbiomedicaltech.com
knowchaos.com
shaedonaldson.net
76999.biz
doitalllandscapingllc.com
compts.top
fuelforhealth.se
gofundhouse.com
vapecanal.co.uk
furniturecomponent.asia
searo.co.uk
internet-providers-45067.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/4788-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4788-190-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4788-193-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4736-196-0x0000000000A10000-0x0000000000A3F000-memory.dmp formbook behavioral2/memory/4736-198-0x0000000000A10000-0x0000000000A3F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation order specification.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1400 set thread context of 4788 1400 order specification.exe 96 PID 4788 set thread context of 3152 4788 order specification.exe 55 PID 4788 set thread context of 3152 4788 order specification.exe 55 PID 4736 set thread context of 3152 4736 chkdsk.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4172 schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1796 powershell.exe 4788 order specification.exe 4788 order specification.exe 1796 powershell.exe 4788 order specification.exe 4788 order specification.exe 4788 order specification.exe 4788 order specification.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe 4736 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3152 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4788 order specification.exe 4788 order specification.exe 4788 order specification.exe 4788 order specification.exe 4736 chkdsk.exe 4736 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1796 powershell.exe Token: SeDebugPrivilege 4788 order specification.exe Token: SeShutdownPrivilege 3152 Explorer.EXE Token: SeCreatePagefilePrivilege 3152 Explorer.EXE Token: SeDebugPrivilege 4736 chkdsk.exe Token: SeShutdownPrivilege 3152 Explorer.EXE Token: SeCreatePagefilePrivilege 3152 Explorer.EXE Token: SeShutdownPrivilege 3152 Explorer.EXE Token: SeCreatePagefilePrivilege 3152 Explorer.EXE Token: SeShutdownPrivilege 3152 Explorer.EXE Token: SeCreatePagefilePrivilege 3152 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3152 Explorer.EXE 3152 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1796 1400 order specification.exe 92 PID 1400 wrote to memory of 1796 1400 order specification.exe 92 PID 1400 wrote to memory of 1796 1400 order specification.exe 92 PID 1400 wrote to memory of 4172 1400 order specification.exe 94 PID 1400 wrote to memory of 4172 1400 order specification.exe 94 PID 1400 wrote to memory of 4172 1400 order specification.exe 94 PID 1400 wrote to memory of 4788 1400 order specification.exe 96 PID 1400 wrote to memory of 4788 1400 order specification.exe 96 PID 1400 wrote to memory of 4788 1400 order specification.exe 96 PID 1400 wrote to memory of 4788 1400 order specification.exe 96 PID 1400 wrote to memory of 4788 1400 order specification.exe 96 PID 1400 wrote to memory of 4788 1400 order specification.exe 96 PID 3152 wrote to memory of 4736 3152 Explorer.EXE 97 PID 3152 wrote to memory of 4736 3152 Explorer.EXE 97 PID 3152 wrote to memory of 4736 3152 Explorer.EXE 97 PID 4736 wrote to memory of 5112 4736 chkdsk.exe 98 PID 4736 wrote to memory of 5112 4736 chkdsk.exe 98 PID 4736 wrote to memory of 5112 4736 chkdsk.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\order specification.exe"C:\Users\Admin\AppData\Local\Temp\order specification.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ShUpVIVzyjGX.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ShUpVIVzyjGX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1916.tmp"3⤵
- Creates scheduled task(s)
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\order specification.exe"C:\Users\Admin\AppData\Local\Temp\order specification.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\order specification.exe"3⤵PID:5112
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5f92a527cf6a16aa41b86cc94e50443de
SHA19317c0c6f76d56189e9eaf1018747b7df57a2f65
SHA25642404dfd7f4ff9edc509073c3c5bc4d28a09ead42b0e5e57b4b1b612b0f76803
SHA512fea56490f79a1878f9ab5b8b7e1a5b220bdd56634997c8b7493743737400de88a46ed0a1cb5987a8f68e9117c26f20a7a5115336c5118532ac050db36773cd41