Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation REF No 016747 PDF.exe
Resource
win7-20230712-en
General
-
Target
Payment Confirmation REF No 016747 PDF.exe
-
Size
253KB
-
MD5
321ac4a7c104daae261c6ce5ed12db5a
-
SHA1
2cf6f37db30b5bdd5b3ae338a4e209c9ccd0f984
-
SHA256
21ccf1fad3e1a08f580d5f0d5aa2d13fb1a633aa1c68100d435628a437efb89b
-
SHA512
35591b1d584daeda8d6997224c6b3edb666f8cb8b7a77950f7411ef6bf030d40b8308168500a12d7f8c503113ba0e870abed8192807f679cfd90a317cf9f03d7
-
SSDEEP
6144:PYa64mTIQqcpm2VNUmdzdr4AiO0iijUg0SkuMPnGKY6X:PYOmTtrVjd2liijUg0tuMeJ0
Malware Config
Extracted
formbook
4.1
sn26
resenha10.bet
gulshan-rajput.com
xbus.tech
z813my.cfd
wlxzjlny.cfd
auntengotiempo.com
canada-reservation.com
thegiftcompany.shop
esthersilveirapropiedades.com
1wapws.top
ymjblnvo.cfd
termokimik.net
kushiro-artist-school.com
bmmboo.com
caceresconstructionservices.com
kentuckywalkabout.com
bringyourcart.com
miamiwinetour.com
bobcatsocial.site
thirdmind.network
4tbbwa.com
rhinosecurellc.net
rdparadise.com
radpm.xyz
thewhiteorchidspa.com
clhynfco.cfd
ngohcvja.cfd
woodennickelcandles.com
gg18rb.cfd
qcdrxwr.cfd
974dp.com
lagardere-vivendi-corp.net
chestnutmaretraining.com
seosjekk.online
ahevrlh.xyz
uedam.xyz
natrada.love
yoywvfw.top
unifiedtradingjapan.com
chinakaldi.com
agenciacolmeiadigital.com
wdlzzfkc.cfd
097850.com
xingcansy.com
uahrbqtj.cfd
charliehaywood.com
witheres.shop
sqiyvdrx.cfd
biopfizer.com
tiktokviewer.com
prftwgmw.cfd
sfsdnwpf.cfd
linkboladewahub.xyz
orvados.com
goodshepherdopcesva.com
christianlovewv.com
cdicontrols.com
hawskio26.click
ownlegalhelp.com
tiydmdzp.cfd
ppirr.biz
stonyatrick.com
itsamazingbarley.com
msjbaddf.cfd
zachmahl.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4472-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4472-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3388-18-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook behavioral2/memory/3388-21-0x00000000003B0000-0x00000000003DF000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 15 3388 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 4812 Payment Confirmation REF No 016747 PDF.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4812 set thread context of 4472 4812 Payment Confirmation REF No 016747 PDF.exe 85 PID 4472 set thread context of 760 4472 Payment Confirmation REF No 016747 PDF.exe 64 PID 3388 set thread context of 760 3388 cmd.exe 64 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 4472 Payment Confirmation REF No 016747 PDF.exe 4472 Payment Confirmation REF No 016747 PDF.exe 4472 Payment Confirmation REF No 016747 PDF.exe 4472 Payment Confirmation REF No 016747 PDF.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe 3388 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 760 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4812 Payment Confirmation REF No 016747 PDF.exe 4472 Payment Confirmation REF No 016747 PDF.exe 4472 Payment Confirmation REF No 016747 PDF.exe 4472 Payment Confirmation REF No 016747 PDF.exe 3388 cmd.exe 3388 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4472 Payment Confirmation REF No 016747 PDF.exe Token: SeDebugPrivilege 3388 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 760 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4472 4812 Payment Confirmation REF No 016747 PDF.exe 85 PID 4812 wrote to memory of 4472 4812 Payment Confirmation REF No 016747 PDF.exe 85 PID 4812 wrote to memory of 4472 4812 Payment Confirmation REF No 016747 PDF.exe 85 PID 4812 wrote to memory of 4472 4812 Payment Confirmation REF No 016747 PDF.exe 85 PID 760 wrote to memory of 3388 760 Explorer.EXE 86 PID 760 wrote to memory of 3388 760 Explorer.EXE 86 PID 760 wrote to memory of 3388 760 Explorer.EXE 86 PID 3388 wrote to memory of 4160 3388 cmd.exe 87 PID 3388 wrote to memory of 4160 3388 cmd.exe 87 PID 3388 wrote to memory of 4160 3388 cmd.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"3⤵PID:4160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD57147f5a82ce4e5d4c0ac9ef31a61e685
SHA120a630132308c935238826f98cbebc7754ff6474
SHA2565e1e79b104e41442160e3e95286e66e5bc60eb04a297cff540c28de26a4d7e7b
SHA51231c6473115bef34848de7ec961d9550a86a02f263504ae7c20e7487e5a052c30708b6295f86bd630f894a05a4f14dd4c26667686dfaf9dbf666c7cfa55435304