Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2023, 01:37

General

  • Target

    a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe

  • Size

    467KB

  • MD5

    90c945b94c8009ea59df1297db8d5109

  • SHA1

    98fed5f6fd694523fda30db36d7ab0b772d8d249

  • SHA256

    a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1

  • SHA512

    d0197eb133ea68a3d9260ac5f125a5562ee4ada3384fe6e7023b3921c68142615abdba32f151237f892f44f03df6b5531f3363ead081412b6e0290b665cebbaf

  • SSDEEP

    6144:OYa67yrc7o9gJ1nlshx+GbxCmVKduVlNxrlM8/P+ayMHZY2PRl:OYAwga1lsT+Gh8uhxrlx/P+XCfZl

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sn84

Decoy

psptek.com

seshoo.com

dogwalknwoof.com

teamdaigle.com

mimzevents.com

algerimarket.com

rr251r55r.xyz

indialgbtq.com

huatongdk.com

couplecoaches.com

fleshlierwickerwork.com

ambito365.store

hoaified.com

shunsuikeji.com

uiomke.xyz

xn--12c4dfj4gtc.net

pika-moon.fun

breakingbarriersglobal.com

aqua-ammo.com

nmc380.top

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe
    "C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe
      "C:\Users\Admin\AppData\Local\Temp\a7a67f0d8860da70cc96c8b72df93811f872175a4aa94230fa583ce2368f79b1.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsv7C0D.tmp\fafddn.dll

    Filesize

    38KB

    MD5

    d24aa0ee826dcf1f4165dc2676190b9b

    SHA1

    7edbac2c3f7f66961655f437e99cc3e916621880

    SHA256

    9f9ddabd7d0e443af9898de7acb32bbd01db940f9b3c39f47a68b6c0c39c3dce

    SHA512

    71236b47c526c5d0a342f2faa49a6f5042454e7aa5f7ff0bdb1172c4e8448f2c762e3e52a99a05c21e66faf8fd82ad10dbbd825f2104839186b488b22e80da7c

  • memory/2184-140-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2184-143-0x0000000000A30000-0x0000000000D7A000-memory.dmp

    Filesize

    3.3MB

  • memory/2724-139-0x0000000000A50000-0x0000000000A52000-memory.dmp

    Filesize

    8KB