Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
10/07/2023, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
QUOTE REQUEST 047855273660.exe
Resource
win7-20230703-en
General
-
Target
QUOTE REQUEST 047855273660.exe
-
Size
725KB
-
MD5
065cf92b7519116b3cbb416e7d31dfba
-
SHA1
706b218470e606e34d6605b6ed776f67c35efc94
-
SHA256
091305d3595b7324e7fb674b6120cdb142a6196e796f890fd625e76a014211e8
-
SHA512
588e33825a813d9ed577e76c8926246633886b6f653f5ddc6f515c16fffbf5438018ba71eb720251d3d53bde1a780acdeb3723148ee6b8604cc168375b451f37
-
SSDEEP
6144:/Jepo8KR2VeL6CIVNcCCBxvIM+PBJUWaYh08H+xxPC8ZhG1xVaqklq5LTyrHsVfm:amZQVtY9GA/4QWM723tlC1tRX0po/9D
Malware Config
Extracted
formbook
4.1
jy95
do-si-dough.com
cchapmanganato.com
04it.icu
kawebdesign.site
oasisconnects.com
op091.com
psychicstandupcomedy.com
harveylee.online
x55568.com
orbinlopez.one
45745931.buzz
undiereleaseco.com
cludybot.net
sailtmtbar.com
siennashih.com
premintxyz.net
xn--bj4bt9j.com
giornalaiditalia.com
colorfullemonade.com
baddiebearz.com
xbkgstd.top
codecultr.com
muenols.xyz
creditors.online
xn--tecnologahbrida-cpbc.com
gotmot.com
physiowithamina.com
smartshoppinghub.store
magis-bo.com
ebayqerbaf.top
hospitalmode.com
strydasoles.store
savvieseller.com
arketha.com
biotherm159.online
fiveclost.sbs
nicholasthemarketer.com
coinpod.app
kassel-strafrecht.com
bbcbcb555.online
voxlinx.online
afm.ventures
yiniao.site
mrsmacksshortbread.com
crashcoursechatgpt.com
fetus.fun
forumconstructioninc.com
finanzas1.com
ussinners.com
conservingjudaism.live
surferscompass.com
blacklifecoachcompany.com
awadhsamachar.com
geektechtalks.com
cryptubank.accountants
hzqywzhs.com
kendradoggrooming.com
isbuae.com
taiyienergyhealing.com
oficial-site-promocao.com
parfermelha.store
digitalshop.biz
crackmyway.com
bretanastore.com
sassnass.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2108-63-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2108-66-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2936-71-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2936-73-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2052 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2224 set thread context of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2108 set thread context of 1212 2108 QUOTE REQUEST 047855273660.exe 12 PID 2936 set thread context of 1212 2936 svchost.exe 12 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2108 QUOTE REQUEST 047855273660.exe 2108 QUOTE REQUEST 047855273660.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe 2936 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2108 QUOTE REQUEST 047855273660.exe 2108 QUOTE REQUEST 047855273660.exe 2108 QUOTE REQUEST 047855273660.exe 2936 svchost.exe 2936 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 QUOTE REQUEST 047855273660.exe Token: SeDebugPrivilege 2936 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 2224 wrote to memory of 2108 2224 QUOTE REQUEST 047855273660.exe 29 PID 1212 wrote to memory of 2936 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2936 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2936 1212 Explorer.EXE 30 PID 1212 wrote to memory of 2936 1212 Explorer.EXE 30 PID 2936 wrote to memory of 2052 2936 svchost.exe 31 PID 2936 wrote to memory of 2052 2936 svchost.exe 31 PID 2936 wrote to memory of 2052 2936 svchost.exe 31 PID 2936 wrote to memory of 2052 2936 svchost.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST 047855273660.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST 047855273660.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST 047855273660.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST 047855273660.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST 047855273660.exe"3⤵
- Deletes itself
PID:2052
-
-