Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents.exe
Resource
win7-20230220-en
General
-
Target
Shipping Documents.exe
-
Size
1.1MB
-
MD5
501077473c7260aa94be655173c8ad40
-
SHA1
dc677d38541268f2c4a42eb8ba71a6960a04efb3
-
SHA256
34834d278c8c71e3cc9d152c073cc444781465c285648630a1be19afab1abd24
-
SHA512
17a8e6021f6dccb9b5848ca6bc02146bd4a8242cf51f6bacbf6b732e7d0e97297337df729b4fd1f7f0abc0a0756122f0fd2a8495416504be65b275208b7e2ae3
-
SSDEEP
12288:5TLaa0X6S2iN6dn1tWKeMTmHY31v8nhaIdpMdZHs747yr5i6cNOYV2nw:Y510313TC0JIdks7iIv1bw
Malware Config
Extracted
formbook
4.1
ca82
idunresearch.com
loiioo1.site
aimobilify.com
limousineswebdesign.com
darshan-enterprises.online
javad.top
dd-spy.com
metamysme.co.uk
earticlesdirect.com
ldkj78v.vip
dariusevory.com
bestyoutubepromoter.com
dogcoinacademy.com
mestredosexo.net
mrnofree.africa
plan.rsvp
hoangnam.site
cadcamperform.com
091888.net
artwaylogistics.com
bigsky1roofing.net
kr-eats.com
millenniumtutors.africa
clarebushire.com
amazonnews.top
farmacoachdigital.com
lasmeralda.net
baochuanlp.com
golf-break100again.com
kgconstrucoes.com
anamaciasdeharo.com
callgaryz.com
dbfsolutely.net
193yz96.xyz
yetcox.online
bet168.plus
lobbyspace.net
kui693.com
athm-consulting.com
warrenlee.africa
kellnovaglobalfood.info
premierpath.net
floffly.art
alaiatech.net
motherpearl.africa
daxiangya.com
mandytelecoms.africa
mbtglobal.africa
dazzleexchange.com
jacksontcpsettlement.com
gadjet1111.com
indiciacompany.com
artistpu.com
colonbroom-reviews.com
leaptrainings.com
harataka.com
athma.xyz
id6w.xyz
hakilakingllc.com
getripay.africa
comedyescape.show
lieblingsmusik.events
bridgerenvm.com
allard-electrical.com
kode-promo.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/1188-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1188-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1188-74-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/840-76-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/840-78-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 700 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1472 set thread context of 1188 1472 Shipping Documents.exe 28 PID 1188 set thread context of 1244 1188 Shipping Documents.exe 7 PID 1188 set thread context of 1244 1188 Shipping Documents.exe 7 PID 840 set thread context of 1244 840 NAPSTAT.EXE 7 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1188 Shipping Documents.exe 1188 Shipping Documents.exe 1188 Shipping Documents.exe 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE 840 NAPSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1188 Shipping Documents.exe 1188 Shipping Documents.exe 1188 Shipping Documents.exe 1188 Shipping Documents.exe 840 NAPSTAT.EXE 840 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1188 Shipping Documents.exe Token: SeDebugPrivilege 840 NAPSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1472 wrote to memory of 1188 1472 Shipping Documents.exe 28 PID 1244 wrote to memory of 840 1244 Explorer.EXE 29 PID 1244 wrote to memory of 840 1244 Explorer.EXE 29 PID 1244 wrote to memory of 840 1244 Explorer.EXE 29 PID 1244 wrote to memory of 840 1244 Explorer.EXE 29 PID 840 wrote to memory of 700 840 NAPSTAT.EXE 30 PID 840 wrote to memory of 700 840 NAPSTAT.EXE 30 PID 840 wrote to memory of 700 840 NAPSTAT.EXE 30 PID 840 wrote to memory of 700 840 NAPSTAT.EXE 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Documents.exe"3⤵
- Deletes itself
PID:700
-
-