Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
rNO10865687X54-Quote.exe
Resource
win7-20230712-en
General
-
Target
rNO10865687X54-Quote.exe
-
Size
703KB
-
MD5
48763155ecb4bc6e86492a17ad92a798
-
SHA1
0e601363e00c8fd7a9fc7a93e689d36d3b5008fa
-
SHA256
edf6c2e805b1b232065ff74c1c2b8c8da24147c9ef17175547ec5fb905005cf1
-
SHA512
a563b45539d3e7a14c6277fa38800d33e9378e6a0a2c7a2c074f921f48aa3d8bf5483d0ca14bb42b6182ec1cd48eebb45720fdcdf21263c3eca067c14887d878
-
SSDEEP
12288:c570Eww2d1mbT6o22B0vUYmXsfMG8tae766R3TnuG9tUiWjndZp:y0Ew0672m8bskGS773reTjnd
Malware Config
Extracted
formbook
4.1
hinf
gemaprojects.com
infinitymarketingsystems.com
pustmegfram.com
mydetailaccelerator.com
zeusoffyp6.click
thegoddessofthehunt.com
abajim.com
jctrhc78.com
iyouiyiti.com
jobscnwire.com
emirates-tobacco.com
onledutech.com
medicinefloor.com
lghyr.fun
dohodnaavtomate.online
fbaxqevemd7.xyz
descontode70porcento.online
assmaco.com
bb845933.site
pinapplecapital.com
jizdna.com
dogsecom.shop
immutepvec.com
ankewayglobal.com
stoaenterprises.com
vitemalls.shop
ferdisparts.com
dyqfzx202308.com
sta4mps.com
glassesupmobilebarservices.com
aspireblockchain.com
salomon-skor-sverige.com
ascenndum.com
betper781.com
onhunhboan.cfd
theedgeofzion.com
aahwwr7p.com
angelandcoinsurance.com
morningbirdschool.com
ctrccadqccpwy.com
067tt.com
zjlzhb.com
theductalcarcinomas.live
qrcodeyes.com
usefight.best
vidanomada101.com
surfmodel.top
lypap.com
findlayxfulton.com
chuanzhe.cfd
jfa-consulting.com
melosboutiquehotel.com
lphm.club
buygreenparkpadeluk.com
cfyuanh.com
verizonwirelcoess.com
national-taxs.top
wigzworld.shop
aigenniti.com
cynthia-costello.com
barbitas.com
mullancero.com
radiantpoolscfl.com
tocbe.yachts
lookmovie136.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4768-152-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4768-170-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3980-195-0x0000000000E00000-0x0000000000E2F000-memory.dmp formbook behavioral2/memory/3980-204-0x0000000000E00000-0x0000000000E2F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1680 set thread context of 4768 1680 rNO10865687X54-Quote.exe 96 PID 4768 set thread context of 3128 4768 rNO10865687X54-Quote.exe 43 PID 3980 set thread context of 3128 3980 control.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3348 powershell.exe 3348 powershell.exe 4768 rNO10865687X54-Quote.exe 4768 rNO10865687X54-Quote.exe 4768 rNO10865687X54-Quote.exe 4768 rNO10865687X54-Quote.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe 3980 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3128 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4768 rNO10865687X54-Quote.exe 4768 rNO10865687X54-Quote.exe 4768 rNO10865687X54-Quote.exe 3980 control.exe 3980 control.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 4768 rNO10865687X54-Quote.exe Token: SeDebugPrivilege 3980 control.exe Token: SeShutdownPrivilege 3128 Explorer.EXE Token: SeCreatePagefilePrivilege 3128 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3348 1680 rNO10865687X54-Quote.exe 92 PID 1680 wrote to memory of 3348 1680 rNO10865687X54-Quote.exe 92 PID 1680 wrote to memory of 3348 1680 rNO10865687X54-Quote.exe 92 PID 1680 wrote to memory of 4108 1680 rNO10865687X54-Quote.exe 94 PID 1680 wrote to memory of 4108 1680 rNO10865687X54-Quote.exe 94 PID 1680 wrote to memory of 4108 1680 rNO10865687X54-Quote.exe 94 PID 1680 wrote to memory of 4768 1680 rNO10865687X54-Quote.exe 96 PID 1680 wrote to memory of 4768 1680 rNO10865687X54-Quote.exe 96 PID 1680 wrote to memory of 4768 1680 rNO10865687X54-Quote.exe 96 PID 1680 wrote to memory of 4768 1680 rNO10865687X54-Quote.exe 96 PID 1680 wrote to memory of 4768 1680 rNO10865687X54-Quote.exe 96 PID 1680 wrote to memory of 4768 1680 rNO10865687X54-Quote.exe 96 PID 3128 wrote to memory of 3980 3128 Explorer.EXE 97 PID 3128 wrote to memory of 3980 3128 Explorer.EXE 97 PID 3128 wrote to memory of 3980 3128 Explorer.EXE 97 PID 3980 wrote to memory of 3684 3980 control.exe 98 PID 3980 wrote to memory of 3684 3980 control.exe 98 PID 3980 wrote to memory of 3684 3980 control.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\rNO10865687X54-Quote.exe"C:\Users\Admin\AppData\Local\Temp\rNO10865687X54-Quote.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GoVkZQX.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GoVkZQX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1642.tmp"3⤵
- Creates scheduled task(s)
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\rNO10865687X54-Quote.exe"C:\Users\Admin\AppData\Local\Temp\rNO10865687X54-Quote.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rNO10865687X54-Quote.exe"3⤵PID:3684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD56e1ec05cce97a3c3e265c4d552daf7f9
SHA1401a9ff3fd69db381cd7cd8ec374c04ebadbe262
SHA256340837d720b5a9bd65ce79567e1871aad39b751cc42ff337856a58b20e56402a
SHA512c3aa5f269164fbd917fee66dba80738d231cd1cc7824619ba00772196b01a408860812145e340c3ca382e7f3b80a05bd60de4a2a638e08ccf3665bf005a2f44d