Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/06/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe
Resource
win7-20230220-en
General
-
Target
a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe
-
Size
467KB
-
MD5
90c945b94c8009ea59df1297db8d5109
-
SHA1
98fed5f6fd694523fda30db36d7ab0b772d8d249
-
SHA256
a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1
-
SHA512
d0197eb133ea68a3d9260ac5f125a5562ee4ada3384fe6e7023b3921c68142615abdba32f151237f892f44f03df6b5531f3363ead081412b6e0290b665cebbaf
-
SSDEEP
6144:OYa67yrc7o9gJ1nlshx+GbxCmVKduVlNxrlM8/P+ayMHZY2PRl:OYAwga1lsT+Gh8uhxrlx/P+XCfZl
Malware Config
Extracted
formbook
4.1
sn84
psptek.com
seshoo.com
dogwalknwoof.com
teamdaigle.com
mimzevents.com
algerimarket.com
rr251r55r.xyz
indialgbtq.com
huatongdk.com
couplecoaches.com
fleshlierwickerwork.com
ambito365.store
hoaified.com
shunsuikeji.com
uiomke.xyz
xn--12c4dfj4gtc.net
pika-moon.fun
breakingbarriersglobal.com
aqua-ammo.com
nmc380.top
959-25.review
esryhs.xyz
thebeadpalace.com
archermag.com
backcountrypizzaandtaphouse.com
gaidarforum.com
valeriaserranoportfolio.com
goodsneaker.online
ihopapo.com
frozzenmagic.com
t3-6qf23.xyz
blogsenso.com
kareemandahmed.net
wisdomthroughfiles.com
piluyi.com
clubordinal.xyz
nichequilt.com
daklakquetoi.click
browzwithme.com
zncdetailing.com
playquestarena.xyz
katherinekarr.com
d4pper.com
tjhbwd.com
journeyto5.com
cdnfiles.website
buy-stromectol.xyz
toolspowerhand.com
sandorgyuris.com
monstera-creations.shop
ant-tron.com
bce273.com
ysee.xyz
heelsandbrushes.com
tristone13th.shop
696e.top
24zps.com
singularity-labs.xyz
merdamao.com
bandulakeerthisinghe.com
9505g.com
canbenice.com
kpsseguros.com
turkiyebihaber.net
petatoto-lx.xyz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1248-61-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1248 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1248 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1248 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe 26 PID 2032 wrote to memory of 1248 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe 26 PID 2032 wrote to memory of 1248 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe 26 PID 2032 wrote to memory of 1248 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe 26 PID 2032 wrote to memory of 1248 2032 a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe"C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe"C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5d24aa0ee826dcf1f4165dc2676190b9b
SHA17edbac2c3f7f66961655f437e99cc3e916621880
SHA2569f9ddabd7d0e443af9898de7acb32bbd01db940f9b3c39f47a68b6c0c39c3dce
SHA51271236b47c526c5d0a342f2faa49a6f5042454e7aa5f7ff0bdb1172c4e8448f2c762e3e52a99a05c21e66faf8fd82ad10dbbd825f2104839186b488b22e80da7c