Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29/06/2023, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20230621-en
General
-
Target
Quotation.exe
-
Size
899KB
-
MD5
91bc4999ed5740509f8eceeed0638400
-
SHA1
f954bd1bd2250d4eb9249f3d9ca5a464b55ee44c
-
SHA256
ddd9ead73e818770fe8bc81da65f863e2ed6d20a6a32c60817d3edc8c4aa38d4
-
SHA512
457cf49c4714fb7cb47539b953fffba9168feea9b3fdaa14f59775e7a119d717fbd806b09736df870b295ce894049f0909626e6d968a61426a6df614a5d606d8
-
SSDEEP
12288:0N8Ne5oHOEQeeZwHyLop6bZFJdj3Kk24ppQRNvSmr5:0CzMwHp6lkk7ppmJj
Malware Config
Extracted
formbook
4.1
cs94
dhaliwal3.com
iptvebay.shop
hsfgass33.top
cammali.com
dcleaningseevicesltd.co.uk
amzosecsn-jp.icu
builtmedia.co.uk
duoguang.top
forumken.net
cqivrh.cfd
lr-nexusark.com
carrirae.shop
jtownexclusive.africa
georoiddemo.online
lefinet.com
otc.rsvp
kitchenpharmacy.co.uk
bbywafz248xca4.com
digijockey.com
9-ji.com
econetv.com
greatonlineshoppingmall.com
requestwebques.online
carpetexperss.com
yuvmh.xyz
nadraservicecentre.co.uk
azerya.tech
chat784.com
houseecare.com
gh-socio.com
cookfleet.xyz
testhamsa.net
humanlongevity.xyz
dhfjda8.com
fantastika.online
lan26.ru
breastcancermascot.com
audley.boo
coandcocoon.com
hollywiancko.com
lazarnejad.com
brocomole.com
carolinacoastalrealestate.homes
franciscoarteaga.com
healthproduct.site
dhubdigitalsolutions.africa
daugoivn.com
domestig.africa
hdwebsite4.info
akinsrealtystation.com
megagist.africa
2826casino.com
jrmastering.ch
independentbmwdiagnostics.co.uk
camoeyes.boo
hgfadhgadfyta.top
lhv-turvakontroll.com
iseedifferent.com
balikesirjenerator.com
hability.xyz
tinawebdesigns.africa
liuyao168.com
rrscu.com
1paikunaway.com
24hrlaundry.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1108-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1108-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/580-73-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/580-75-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1884 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1744 set thread context of 1108 1744 Quotation.exe 28 PID 1108 set thread context of 1292 1108 Quotation.exe 15 PID 580 set thread context of 1292 580 rundll32.exe 15 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1108 Quotation.exe 1108 Quotation.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1292 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1108 Quotation.exe 1108 Quotation.exe 1108 Quotation.exe 580 rundll32.exe 580 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1108 Quotation.exe Token: SeDebugPrivilege 580 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1292 Explorer.EXE 1292 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1744 wrote to memory of 1108 1744 Quotation.exe 28 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 1292 wrote to memory of 580 1292 Explorer.EXE 29 PID 580 wrote to memory of 1884 580 rundll32.exe 30 PID 580 wrote to memory of 1884 580 rundll32.exe 30 PID 580 wrote to memory of 1884 580 rundll32.exe 30 PID 580 wrote to memory of 1884 580 rundll32.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Deletes itself
PID:1884
-
-