Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
24/08/2023, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
4E43EF75D5C98C17C569BF9EEE0C6128.exe
Resource
win7-20230712-en
General
-
Target
4E43EF75D5C98C17C569BF9EEE0C6128.exe
-
Size
272KB
-
MD5
4e43ef75d5c98c17c569bf9eee0c6128
-
SHA1
460adbbe24ceb5e17ef28f32811975865fe0f9ac
-
SHA256
314bb1d4fa16c81993064e89179f3027d2c7235c7f829111884c2beac761b353
-
SHA512
2f7e6ac7ba97123871fa9afd604b2a40fda6abf76b03e6c67dc97e698db8956f141808286f348e870810cad505d9a40226e97e35fce113e185750118d6911c23
-
SSDEEP
6144:PYa6sgzZPbTD9iKR539ZHLWcoi/tzKXvXz+DOYcus8djh11zXvif:PYKMZ/N/RacoMtzij+DOYb5hPqf
Malware Config
Extracted
formbook
4.1
mh21
qiandaye.top
zltgw.com
getxgp.link
forest-create.site
parsefilm.com
foodstore.top
reynoldsquality.com
tripleshops.com
altuwaijrifood.com
seniorassistedlivinglocator.com
essencedelanature.com
hrwv098.xyz
olkja.xyz
10685johansen.com
ajidenhp.com
sensifiedregistration.com
timetodatings.life
bizbet-review-pt.com
zhangming.asia
xn--vhq074eeozsda.top
rygodigital.site
cellphonespoland.today
dentsfirst.com
envrliteracyprojectia.online
friendsislove.com
g1t1v5am.top
naturo-construction.com
jstzzlm.com
cukservers.net
serofix.com
afhpj.com
westnewburyopenspace.net
copperstatenotary.com
rw6dh.top
5812harold.com
zzfd.shop
webmarketingrocket.com
bcdwg.com
amotcabo.com
accountswallet.com
itechsarl.net
wakuy.app
mmacpdrm.click
2d8t36nfmh.skin
kimberlys-portfolio.com
iran-protests.com
bodhiheals.com
mkamiart.com
cuprolifestyle.com
smartpartproducts.com
7300-banking.pro
dinheirofacil.digital
fednowdigitalpayment.com
hokkoriidol.com
agapehomecleaning.com
iicaqjls.click
53dorethyrd.com
indepqueretaro.com
fsjixrkh83o.cyou
seomasteraff.net
dbwci.com
simplebly.store
calicarmovers.com
opleermandmand.com
xpcslda.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2568-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 2568 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2568 4E43EF75D5C98C17C569BF9EEE0C6128.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2568 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe 28 PID 2912 wrote to memory of 2568 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe 28 PID 2912 wrote to memory of 2568 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe 28 PID 2912 wrote to memory of 2568 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe 28 PID 2912 wrote to memory of 2568 2912 4E43EF75D5C98C17C569BF9EEE0C6128.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4E43EF75D5C98C17C569BF9EEE0C6128.exe"C:\Users\Admin\AppData\Local\Temp\4E43EF75D5C98C17C569BF9EEE0C6128.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\4E43EF75D5C98C17C569BF9EEE0C6128.exe"C:\Users\Admin\AppData\Local\Temp\4E43EF75D5C98C17C569BF9EEE0C6128.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD52c79d9f6cfe8f8b6e602ab1d54ef2723
SHA1b8dd3435ce0f1d89881c5e064b88060b8db8fa03
SHA25663fc2c300862681da657d2c1c07c566800e6d0ce38301d9c3208663dd3af37ab
SHA512ecede2e616145856fc082c05cae99c6f9086e33c834071da1991d60bec4e07202aaa864629ccd86ad1e12a1f6426c4cb494dfcf909ce08d071b2f56d2efb43d1