Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 10:18

General

  • Target

    Payment Confirmation REF No 016747 PDF.exe

  • Size

    253KB

  • MD5

    321ac4a7c104daae261c6ce5ed12db5a

  • SHA1

    2cf6f37db30b5bdd5b3ae338a4e209c9ccd0f984

  • SHA256

    21ccf1fad3e1a08f580d5f0d5aa2d13fb1a633aa1c68100d435628a437efb89b

  • SHA512

    35591b1d584daeda8d6997224c6b3edb666f8cb8b7a77950f7411ef6bf030d40b8308168500a12d7f8c503113ba0e870abed8192807f679cfd90a317cf9f03d7

  • SSDEEP

    6144:PYa64mTIQqcpm2VNUmdzdr4AiO0iijUg0SkuMPnGKY6X:PYOmTtrVjd2liijUg0tuMeJ0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sn26

Decoy

resenha10.bet

gulshan-rajput.com

xbus.tech

z813my.cfd

wlxzjlny.cfd

auntengotiempo.com

canada-reservation.com

thegiftcompany.shop

esthersilveirapropiedades.com

1wapws.top

ymjblnvo.cfd

termokimik.net

kushiro-artist-school.com

bmmboo.com

caceresconstructionservices.com

kentuckywalkabout.com

bringyourcart.com

miamiwinetour.com

bobcatsocial.site

thirdmind.network

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2632
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"
        3⤵
        • Deletes itself
        PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsoC248.tmp\qphtlw.dll

    Filesize

    47KB

    MD5

    7147f5a82ce4e5d4c0ac9ef31a61e685

    SHA1

    20a630132308c935238826f98cbebc7754ff6474

    SHA256

    5e1e79b104e41442160e3e95286e66e5bc60eb04a297cff540c28de26a4d7e7b

    SHA512

    31c6473115bef34848de7ec961d9550a86a02f263504ae7c20e7487e5a052c30708b6295f86bd630f894a05a4f14dd4c26667686dfaf9dbf666c7cfa55435304

  • \Users\Admin\AppData\Local\Temp\nsoC248.tmp\qphtlw.dll

    Filesize

    47KB

    MD5

    7147f5a82ce4e5d4c0ac9ef31a61e685

    SHA1

    20a630132308c935238826f98cbebc7754ff6474

    SHA256

    5e1e79b104e41442160e3e95286e66e5bc60eb04a297cff540c28de26a4d7e7b

    SHA512

    31c6473115bef34848de7ec961d9550a86a02f263504ae7c20e7487e5a052c30708b6295f86bd630f894a05a4f14dd4c26667686dfaf9dbf666c7cfa55435304

  • memory/1288-14-0x00000000085F0000-0x0000000008751000-memory.dmp

    Filesize

    1.4MB

  • memory/1288-30-0x0000000009130000-0x000000000929F000-memory.dmp

    Filesize

    1.4MB

  • memory/1288-28-0x0000000009130000-0x000000000929F000-memory.dmp

    Filesize

    1.4MB

  • memory/1288-27-0x0000000009130000-0x000000000929F000-memory.dmp

    Filesize

    1.4MB

  • memory/1288-13-0x0000000003620000-0x0000000003720000-memory.dmp

    Filesize

    1024KB

  • memory/1288-23-0x00000000085F0000-0x0000000008751000-memory.dmp

    Filesize

    1.4MB

  • memory/1416-24-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/1416-16-0x0000000000540000-0x000000000054E000-memory.dmp

    Filesize

    56KB

  • memory/1416-18-0x0000000000540000-0x000000000054E000-memory.dmp

    Filesize

    56KB

  • memory/1416-20-0x0000000000540000-0x000000000054E000-memory.dmp

    Filesize

    56KB

  • memory/1416-21-0x00000000000F0000-0x000000000011F000-memory.dmp

    Filesize

    188KB

  • memory/1416-22-0x00000000021C0000-0x00000000024C3000-memory.dmp

    Filesize

    3.0MB

  • memory/1416-26-0x0000000001EF0000-0x0000000001F84000-memory.dmp

    Filesize

    592KB

  • memory/2600-7-0x0000000001EB0000-0x0000000001EB2000-memory.dmp

    Filesize

    8KB

  • memory/2632-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2632-12-0x0000000000A30000-0x0000000000A45000-memory.dmp

    Filesize

    84KB

  • memory/2632-9-0x0000000000700000-0x0000000000A03000-memory.dmp

    Filesize

    3.0MB

  • memory/2632-8-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB