Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
74291.exe
Resource
win7-20230220-en
General
-
Target
74291.exe
-
Size
638KB
-
MD5
d4f369f573c973d833f5060c6b80e929
-
SHA1
1ef7c6cf58b39dba64d282d701f5992acfae830e
-
SHA256
79f878be696492904510496633fcdc7458f7b2e2efb373f7d097b2276a708e51
-
SHA512
e57e29b18f75b94445fa732aac2c31a1d30bb2011442b2736073bdabd12949d057bcae7f340f6f26619e70e86cc95a099fca4cb3a654880c6189f30901e6cdae
-
SSDEEP
12288:C2N8jiZ4zypIPEtPplTY6RhKuEX1n+sDUyHVCw0VkKL3QXtzx/yffqx:C2N8jiZ4zypIPEJTDE/X1n+iUy1Cwogo
Malware Config
Extracted
formbook
4.1
a2e2
emptylegtrip.com
figge.shop
euro-easy-capital.com
coinsbaseotc.com
midnight-iohk.net
cweas.online
pennymanning.net
shiehkids.net
undawear.africa
aheartfelttouch.com
attorneycaraccidents.net
colourkodedllc.com
love2lovebeautifulpleasures.com
loan-fha-now.com
mdc-shop.net
chooselifeministriescenter.com
oliverhodkinson.co.uk
data-link.site
foxton.store
dongtay.group
benjaminlucas.site
eldamarsanxenxo.com
b0onsupply.com
smartmlspropkit.net
11c.tokyo
meldrumsceres.co.uk
vavic.net
naijajacks.africa
inkwellfinance.com
eddiebeachshack.com
jpstonemartinc.com
honghuo1457.top
eklof.email
felizhouse-okna.ru
yoursolared.com
electriciannewbedfordma.com
calisrootjuice.com
ev-rum.com
hashtag-radio.net
hustleinc.net
jidobrothers.africa
geekyai.com
fightexplorer.com
ccclabs.net
originallyusaka.com
chrisyeo.click
bartkroconsulting.com
bozartart.club
hvacplusllc.com
displayelectricalservices.com
asaldl.xyz
daisywolf.top
arrayholidaytravels.com
visionscreeners.africa
ebenezerbandeira.com
saintbaptistellp.co.uk
amazingvictoria.shop
clkfoot.com
lovlex.com
b21385aa.com
bikenbells.com
livepureandhealthy.africa
whynotapp.net
btmovi.love
somersetcorp.co.uk
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/2400-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2400-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2400-151-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1260-153-0x0000000000340000-0x000000000036F000-memory.dmp formbook behavioral2/memory/1260-155-0x0000000000340000-0x000000000036F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3812 set thread context of 2400 3812 74291.exe 91 PID 2400 set thread context of 3172 2400 74291.exe 39 PID 2400 set thread context of 3172 2400 74291.exe 39 PID 1260 set thread context of 3172 1260 colorcpl.exe 39 -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 3812 74291.exe 3812 74291.exe 3812 74291.exe 3812 74291.exe 3812 74291.exe 3812 74291.exe 3812 74291.exe 2400 74291.exe 2400 74291.exe 2400 74291.exe 2400 74291.exe 2400 74291.exe 2400 74291.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe 1260 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3172 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2400 74291.exe 2400 74291.exe 2400 74291.exe 2400 74291.exe 1260 colorcpl.exe 1260 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3812 74291.exe Token: SeDebugPrivilege 2400 74291.exe Token: SeDebugPrivilege 1260 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3812 wrote to memory of 2400 3812 74291.exe 91 PID 3812 wrote to memory of 2400 3812 74291.exe 91 PID 3812 wrote to memory of 2400 3812 74291.exe 91 PID 3812 wrote to memory of 2400 3812 74291.exe 91 PID 3812 wrote to memory of 2400 3812 74291.exe 91 PID 3812 wrote to memory of 2400 3812 74291.exe 91 PID 3172 wrote to memory of 1260 3172 Explorer.EXE 92 PID 3172 wrote to memory of 1260 3172 Explorer.EXE 92 PID 3172 wrote to memory of 1260 3172 Explorer.EXE 92 PID 1260 wrote to memory of 4008 1260 colorcpl.exe 93 PID 1260 wrote to memory of 4008 1260 colorcpl.exe 93 PID 1260 wrote to memory of 4008 1260 colorcpl.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\74291.exe"C:\Users\Admin\AppData\Local\Temp\74291.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\74291.exe"C:\Users\Admin\AppData\Local\Temp\74291.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\74291.exe"3⤵PID:4008
-
-