Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe
Resource
win7-20230712-en
General
-
Target
fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe
-
Size
545KB
-
MD5
b661633cfae6e392a3994073f6efc706
-
SHA1
a81a13005df44e605ef3e17c05adb77b009cf774
-
SHA256
fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468
-
SHA512
3c50916a58985027771660e104812cea7920ba374d00f70b92ba788ada61187ed0c7e8f307ad194bbd82564b01cd31dc11af2dbab82bde3701f2e5f6795112d5
-
SSDEEP
12288:xqDU6pqFdwBg8HT4zoYe1A5OTb8H8lrTDYnbE:gDRqMBnzFh1A55H86n
Malware Config
Extracted
formbook
4.1
oy30
rfc234.top
danielcavalari.com
elperegrinocabo.com
aryor.info
surelistening.com
premium-numero-telf.buzz
orlynyml.click
tennislovers-ro.com
holdmytracker.com
eewapay.com
jaimesinstallglass.com
damactrade.net
swapspecialities.com
perfumesrffd.today
salesfactory.pro
supportive-solutions.com
naiol.com
khoyr.com
kalendeargpt44.com
web-tech-spb.store
lodjireal.online
ultraflooringmore.com
iwantbundles.com
theroofer.lat
qwxry.fun
faserfreunde.com
body-for-living.com
welnessfit.com
clublucky.store
nlast.cyou
gkoders.com
okxmttwa.click
nodesofty.com
alemania-paredes.com
travel-insuranceprice.shop
thechaay.com
formulavsupplements.com
gstringtheory.com
ruopenai.com
evi-based.com
danleugers.com
lojinhaevelyn.com
denzaimivsem.buzz
izmn2vd8.click
asliy.top
kawitrack.com
brandiai.com
ssssne.com
asianewsgood.online
proloop.work
dhikaedwina.com
onemarinallc.com
realmpabq.com
boswells.biz
jpxiaoxi.top
ishirink.com
thundershorts.com
rainydayroofs.com
atatra.com
hftroi.xyz
fundamentplus.com
gsvaedpzugtdn.com
mic-reform.info
vacuumbagsuppliers.com
gaoxiba150.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4880-142-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 4880 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 4880 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2716 wrote to memory of 872 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 90 PID 2716 wrote to memory of 872 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 90 PID 2716 wrote to memory of 872 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 90 PID 2716 wrote to memory of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91 PID 2716 wrote to memory of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91 PID 2716 wrote to memory of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91 PID 2716 wrote to memory of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91 PID 2716 wrote to memory of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91 PID 2716 wrote to memory of 4880 2716 fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe"2⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fbfd173952479920e0f3a8aa41bdd2faea86d2de9a7080a023831e4769c94468exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-