Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2023, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe
Resource
win7-20230220-en
General
-
Target
841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe
-
Size
816KB
-
MD5
f9df3670e25d3846200606958b47c4e5
-
SHA1
1177bfdae58c9f07f1bfc4d873a02562423c20d8
-
SHA256
841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410
-
SHA512
9895e4d8bf6649838aefe23fa904d70256dac09003d4b18b1a5bda7c61896c30982828077e349810d88492ae6eacb3721ff3a82fc83975f6d8c4599c459bb6d4
-
SSDEEP
12288:1S8hue/3H1OdvmnHKpBnM8NU1TwBiW7okCT66tk0riptH+VO8kevckNx:1BOdv8KpS8dBX7o7Fctekk
Malware Config
Extracted
formbook
4.1
ga36
700kitchen.com
udda.app
fractionalgc.tech
tipmercados.net
2-upapparel.net
directbookdiscount.com
koewetzeltours.com
d7c8-iuxt.com
hamaancook.com
benjaimnmoore.com
yimaglobal.africa
dispovapo.com
aseguvenlik.com
battery-worth.com
dddanbao.mobi
blueskyauberge.com
740.mobi
betterbonella.com
liverally.club
czubao.com
elliotthead.com
borkr.one
drvnsat.net
coldwellbankersolar.com
cityofexpertise.co.uk
independentdentist.network
bladesofbeautybymichelle.com
gqf5y.com
astergab.com
eventinvite.rsvp
indyfurnitureguild.com
theunrelentingbrush.co.uk
concealedcarry.info
a-alphaxtraboost.com
21diasdegratitud.com
edlevostatus.se
hradvocaciacriminal.com
efefindustrious.buzz
arafat.xyz
jlhaoniu.com
citizensbank.top
eatzpizzeria.com
everestfunerak.com
thecovenscorner.co.uk
subskrebcstumer.com
calabatherapy.com
braces-cost-affordable.com
erinandjacob.com
hakkaqq.website
flymavis.com
9774.top
hcthi.com
ecommercecolcorp.com
blackbluejetfriday.com
fralu.tech
biohackinghealthspan.com
cumhuriyet.click
dynamicbingo.live
jonashaapp.store
intentionallivingsoul.com
careerguru.academy
mexob.online
calaaccessories.com
kolagaems.com
310003.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1212-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1212 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 1212 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91 PID 1640 wrote to memory of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91 PID 1640 wrote to memory of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91 PID 1640 wrote to memory of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91 PID 1640 wrote to memory of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91 PID 1640 wrote to memory of 1212 1640 841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"C:\Users\Admin\AppData\Local\Temp\841f916fd211961d16b57c00fede97127720d6d2ea52e914fa13661b1d728410.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-