Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
obizx.exe
Resource
win7-20230712-en
General
-
Target
obizx.exe
-
Size
605KB
-
MD5
745174884165278ca284212180544a17
-
SHA1
920d5344b51f4f97cd92230e85c339c2237aaf1f
-
SHA256
2e43e75303476b0eff6585680ad006cc7a7506a4564aa49504512ee3b6621884
-
SHA512
b27d88282d10f6ecb0de600c4800e8b07f97a7348f47ee996cd205a1a84e5beafdbe4c6f4e589aceb56261c85c0dc95108c3fdb88cfcbc1077daadde7bca0d80
-
SSDEEP
12288:mg7JYihlZ/dMkbGo4suHNmS3cgexJAY7ytxcFmRCkn8RWpaxOXskry:mg7CClxek9huHNi1JAY72xr4kqW8xOXB
Malware Config
Extracted
formbook
4.1
oy30
rfc234.top
danielcavalari.com
elperegrinocabo.com
aryor.info
surelistening.com
premium-numero-telf.buzz
orlynyml.click
tennislovers-ro.com
holdmytracker.com
eewapay.com
jaimesinstallglass.com
damactrade.net
swapspecialities.com
perfumesrffd.today
salesfactory.pro
supportive-solutions.com
naiol.com
khoyr.com
kalendeargpt44.com
web-tech-spb.store
lodjireal.online
ultraflooringmore.com
iwantbundles.com
theroofer.lat
qwxry.fun
faserfreunde.com
body-for-living.com
welnessfit.com
clublucky.store
nlast.cyou
gkoders.com
okxmttwa.click
nodesofty.com
alemania-paredes.com
travel-insuranceprice.shop
thechaay.com
formulavsupplements.com
gstringtheory.com
ruopenai.com
evi-based.com
danleugers.com
lojinhaevelyn.com
denzaimivsem.buzz
izmn2vd8.click
asliy.top
kawitrack.com
brandiai.com
ssssne.com
asianewsgood.online
proloop.work
dhikaedwina.com
onemarinallc.com
realmpabq.com
boswells.biz
jpxiaoxi.top
ishirink.com
thundershorts.com
rainydayroofs.com
atatra.com
hftroi.xyz
fundamentplus.com
gsvaedpzugtdn.com
mic-reform.info
vacuumbagsuppliers.com
gaoxiba150.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2356-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2356-72-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1864-78-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1864-80-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1232 set thread context of 2356 1232 obizx.exe 30 PID 2356 set thread context of 1260 2356 obizx.exe 11 PID 1864 set thread context of 1260 1864 raserver.exe 11 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2356 obizx.exe 2356 obizx.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe 1864 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2356 obizx.exe 2356 obizx.exe 2356 obizx.exe 1864 raserver.exe 1864 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2356 obizx.exe Token: SeDebugPrivilege 1864 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1232 wrote to memory of 2356 1232 obizx.exe 30 PID 1260 wrote to memory of 1864 1260 Explorer.EXE 31 PID 1260 wrote to memory of 1864 1260 Explorer.EXE 31 PID 1260 wrote to memory of 1864 1260 Explorer.EXE 31 PID 1260 wrote to memory of 1864 1260 Explorer.EXE 31 PID 1864 wrote to memory of 2348 1864 raserver.exe 32 PID 1864 wrote to memory of 2348 1864 raserver.exe 32 PID 1864 wrote to memory of 2348 1864 raserver.exe 32 PID 1864 wrote to memory of 2348 1864 raserver.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\obizx.exe"C:\Users\Admin\AppData\Local\Temp\obizx.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\obizx.exe"C:\Users\Admin\AppData\Local\Temp\obizx.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\obizx.exe"3⤵
- Deletes itself
PID:2348
-
-