Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2023, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe
Resource
win7-20230712-en
General
-
Target
69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe
-
Size
283KB
-
MD5
3ebc4be338c1302a6f6e0bd7b54fe53e
-
SHA1
815f0f48fa90603919cf33ba25f99cf0a4b9996d
-
SHA256
69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0f
-
SHA512
fac2ca3553cbad3c1f875e725cc65b116298c8b730902c4b7a0c48fbd957015e38d7df332bfc54266215407ac7f0059046aabf176e08f4e9bc945926fbeb3944
-
SSDEEP
6144:/Ya6BoVt7aHVDMwNv7veEH06QgBQxj3yMu9LQs6QRVdk1g:/YTM7aBNv7vuIQ5yzaQu2
Malware Config
Extracted
formbook
4.1
sn26
resenha10.bet
gulshan-rajput.com
xbus.tech
z813my.cfd
wlxzjlny.cfd
auntengotiempo.com
canada-reservation.com
thegiftcompany.shop
esthersilveirapropiedades.com
1wapws.top
ymjblnvo.cfd
termokimik.net
kushiro-artist-school.com
bmmboo.com
caceresconstructionservices.com
kentuckywalkabout.com
bringyourcart.com
miamiwinetour.com
bobcatsocial.site
thirdmind.network
4tbbwa.com
rhinosecurellc.net
rdparadise.com
radpm.xyz
thewhiteorchidspa.com
clhynfco.cfd
ngohcvja.cfd
woodennickelcandles.com
gg18rb.cfd
qcdrxwr.cfd
974dp.com
lagardere-vivendi-corp.net
chestnutmaretraining.com
seosjekk.online
ahevrlh.xyz
uedam.xyz
natrada.love
yoywvfw.top
unifiedtradingjapan.com
chinakaldi.com
agenciacolmeiadigital.com
wdlzzfkc.cfd
097850.com
xingcansy.com
uahrbqtj.cfd
charliehaywood.com
witheres.shop
sqiyvdrx.cfd
biopfizer.com
tiktokviewer.com
prftwgmw.cfd
sfsdnwpf.cfd
linkboladewahub.xyz
orvados.com
goodshepherdopcesva.com
christianlovewv.com
cdicontrols.com
hawskio26.click
ownlegalhelp.com
tiydmdzp.cfd
ppirr.biz
stonyatrick.com
itsamazingbarley.com
msjbaddf.cfd
zachmahl.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/760-140-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4856 set thread context of 760 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 760 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe 760 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4856 wrote to memory of 760 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe 82 PID 4856 wrote to memory of 760 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe 82 PID 4856 wrote to memory of 760 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe 82 PID 4856 wrote to memory of 760 4856 69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\69b78313535ef2b6dc89c71b8c389907e8a02cccb5d9fdee05833d69aac84c0fexe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD547dc5740ac18d6324cc40f383058f095
SHA1547e1bd449278f35ee2fa212a486bb12ad42ff84
SHA256f3256c298bef3b4070df894a2497eccb7619554966299f2a4c26fcf94b7d541d
SHA51253c9884adadab0a35c6941d96fdb28e47852aa4d1a77b2a96bd6c927ec618fc1b1f9bb4d868eda8a4d25f61b31d74ba3a2b2c96d7b118f7ceac4f78b9508e725