Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
rProductSpecs.exe
Resource
win7-20230712-en
General
-
Target
rProductSpecs.exe
-
Size
594KB
-
MD5
05579b705197cc4ff3728af6d4d49f08
-
SHA1
89fb958792780a68990427aa3d8dfc9262c05dc1
-
SHA256
cc0f366752ad8832bf26a387da04626c8db6f00a69d5a98ce5934d0db01c1329
-
SHA512
b2bb887f3f07aa64afd7d3c6afce1532c83d380b25e0ef984ac591e3a4aac4980f18367370ddfbb0028bedc43b2ca4020f2b99fa149c75cff6e1ed7ed7b113bc
-
SSDEEP
12288:fbqwi/iWsjKX/Covqtk1Nla6KU9HTk8WjssUD1hZfxgEqD:jqwiiW9CysDOg8fh9xC
Malware Config
Extracted
formbook
4.1
hinf
gemaprojects.com
infinitymarketingsystems.com
pustmegfram.com
mydetailaccelerator.com
zeusoffyp6.click
thegoddessofthehunt.com
abajim.com
jctrhc78.com
iyouiyiti.com
jobscnwire.com
emirates-tobacco.com
onledutech.com
medicinefloor.com
lghyr.fun
dohodnaavtomate.online
fbaxqevemd7.xyz
descontode70porcento.online
assmaco.com
bb845933.site
pinapplecapital.com
jizdna.com
dogsecom.shop
immutepvec.com
ankewayglobal.com
stoaenterprises.com
vitemalls.shop
ferdisparts.com
dyqfzx202308.com
sta4mps.com
glassesupmobilebarservices.com
aspireblockchain.com
salomon-skor-sverige.com
ascenndum.com
betper781.com
onhunhboan.cfd
theedgeofzion.com
aahwwr7p.com
angelandcoinsurance.com
morningbirdschool.com
ctrccadqccpwy.com
067tt.com
zjlzhb.com
theductalcarcinomas.live
qrcodeyes.com
usefight.best
vidanomada101.com
surfmodel.top
lypap.com
findlayxfulton.com
chuanzhe.cfd
jfa-consulting.com
melosboutiquehotel.com
lphm.club
buygreenparkpadeluk.com
cfyuanh.com
verizonwirelcoess.com
national-taxs.top
wigzworld.shop
aigenniti.com
cynthia-costello.com
barbitas.com
mullancero.com
radiantpoolscfl.com
tocbe.yachts
lookmovie136.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2820-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2820-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2884-24-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2884-26-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2852 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1716 set thread context of 2820 1716 rProductSpecs.exe 30 PID 2820 set thread context of 1400 2820 rProductSpecs.exe 13 PID 2884 set thread context of 1400 2884 svchost.exe 13 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2820 rProductSpecs.exe 2820 rProductSpecs.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe 2884 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2820 rProductSpecs.exe 2820 rProductSpecs.exe 2820 rProductSpecs.exe 2884 svchost.exe 2884 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2820 rProductSpecs.exe Token: SeDebugPrivilege 2884 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1716 wrote to memory of 2820 1716 rProductSpecs.exe 30 PID 1400 wrote to memory of 2884 1400 Explorer.EXE 31 PID 1400 wrote to memory of 2884 1400 Explorer.EXE 31 PID 1400 wrote to memory of 2884 1400 Explorer.EXE 31 PID 1400 wrote to memory of 2884 1400 Explorer.EXE 31 PID 2884 wrote to memory of 2852 2884 svchost.exe 32 PID 2884 wrote to memory of 2852 2884 svchost.exe 32 PID 2884 wrote to memory of 2852 2884 svchost.exe 32 PID 2884 wrote to memory of 2852 2884 svchost.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\rProductSpecs.exe"C:\Users\Admin\AppData\Local\Temp\rProductSpecs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\rProductSpecs.exe"C:\Users\Admin\AppData\Local\Temp\rProductSpecs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rProductSpecs.exe"3⤵
- Deletes itself
PID:2852
-
-