Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2023, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20230621-en
General
-
Target
Quotation.exe
-
Size
899KB
-
MD5
91bc4999ed5740509f8eceeed0638400
-
SHA1
f954bd1bd2250d4eb9249f3d9ca5a464b55ee44c
-
SHA256
ddd9ead73e818770fe8bc81da65f863e2ed6d20a6a32c60817d3edc8c4aa38d4
-
SHA512
457cf49c4714fb7cb47539b953fffba9168feea9b3fdaa14f59775e7a119d717fbd806b09736df870b295ce894049f0909626e6d968a61426a6df614a5d606d8
-
SSDEEP
12288:0N8Ne5oHOEQeeZwHyLop6bZFJdj3Kk24ppQRNvSmr5:0CzMwHp6lkk7ppmJj
Malware Config
Extracted
formbook
4.1
cs94
dhaliwal3.com
iptvebay.shop
hsfgass33.top
cammali.com
dcleaningseevicesltd.co.uk
amzosecsn-jp.icu
builtmedia.co.uk
duoguang.top
forumken.net
cqivrh.cfd
lr-nexusark.com
carrirae.shop
jtownexclusive.africa
georoiddemo.online
lefinet.com
otc.rsvp
kitchenpharmacy.co.uk
bbywafz248xca4.com
digijockey.com
9-ji.com
econetv.com
greatonlineshoppingmall.com
requestwebques.online
carpetexperss.com
yuvmh.xyz
nadraservicecentre.co.uk
azerya.tech
chat784.com
houseecare.com
gh-socio.com
cookfleet.xyz
testhamsa.net
humanlongevity.xyz
dhfjda8.com
fantastika.online
lan26.ru
breastcancermascot.com
audley.boo
coandcocoon.com
hollywiancko.com
lazarnejad.com
brocomole.com
carolinacoastalrealestate.homes
franciscoarteaga.com
healthproduct.site
dhubdigitalsolutions.africa
daugoivn.com
domestig.africa
hdwebsite4.info
akinsrealtystation.com
megagist.africa
2826casino.com
jrmastering.ch
independentbmwdiagnostics.co.uk
camoeyes.boo
hgfadhgadfyta.top
lhv-turvakontroll.com
iseedifferent.com
balikesirjenerator.com
hability.xyz
tinawebdesigns.africa
liuyao168.com
rrscu.com
1paikunaway.com
24hrlaundry.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4596-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4596-146-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1472-149-0x00000000006E0000-0x000000000070F000-memory.dmp formbook behavioral2/memory/1472-151-0x00000000006E0000-0x000000000070F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1748 set thread context of 4596 1748 Quotation.exe 93 PID 4596 set thread context of 3108 4596 Quotation.exe 29 PID 1472 set thread context of 3108 1472 colorcpl.exe 29 -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 4596 Quotation.exe 4596 Quotation.exe 4596 Quotation.exe 4596 Quotation.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe 1472 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3108 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4596 Quotation.exe 4596 Quotation.exe 4596 Quotation.exe 1472 colorcpl.exe 1472 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4596 Quotation.exe Token: SeDebugPrivilege 1472 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4596 1748 Quotation.exe 93 PID 1748 wrote to memory of 4596 1748 Quotation.exe 93 PID 1748 wrote to memory of 4596 1748 Quotation.exe 93 PID 1748 wrote to memory of 4596 1748 Quotation.exe 93 PID 1748 wrote to memory of 4596 1748 Quotation.exe 93 PID 1748 wrote to memory of 4596 1748 Quotation.exe 93 PID 3108 wrote to memory of 1472 3108 Explorer.EXE 94 PID 3108 wrote to memory of 1472 3108 Explorer.EXE 94 PID 3108 wrote to memory of 1472 3108 Explorer.EXE 94 PID 1472 wrote to memory of 4252 1472 colorcpl.exe 95 PID 1472 wrote to memory of 4252 1472 colorcpl.exe 95 PID 1472 wrote to memory of 4252 1472 colorcpl.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵PID:4252
-
-