Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 10:18

General

  • Target

    Payment Confirmation REF No 016747 PDF.exe

  • Size

    253KB

  • MD5

    321ac4a7c104daae261c6ce5ed12db5a

  • SHA1

    2cf6f37db30b5bdd5b3ae338a4e209c9ccd0f984

  • SHA256

    21ccf1fad3e1a08f580d5f0d5aa2d13fb1a633aa1c68100d435628a437efb89b

  • SHA512

    35591b1d584daeda8d6997224c6b3edb666f8cb8b7a77950f7411ef6bf030d40b8308168500a12d7f8c503113ba0e870abed8192807f679cfd90a317cf9f03d7

  • SSDEEP

    6144:PYa64mTIQqcpm2VNUmdzdr4AiO0iijUg0SkuMPnGKY6X:PYOmTtrVjd2liijUg0tuMeJ0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sn26

Decoy

resenha10.bet

gulshan-rajput.com

xbus.tech

z813my.cfd

wlxzjlny.cfd

auntengotiempo.com

canada-reservation.com

thegiftcompany.shop

esthersilveirapropiedades.com

1wapws.top

ymjblnvo.cfd

termokimik.net

kushiro-artist-school.com

bmmboo.com

caceresconstructionservices.com

kentuckywalkabout.com

bringyourcart.com

miamiwinetour.com

bobcatsocial.site

thirdmind.network

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4812
      • C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4472
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3388
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation REF No 016747 PDF.exe"
        3⤵
          PID:4160

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nstC8.tmp\qphtlw.dll

      Filesize

      47KB

      MD5

      7147f5a82ce4e5d4c0ac9ef31a61e685

      SHA1

      20a630132308c935238826f98cbebc7754ff6474

      SHA256

      5e1e79b104e41442160e3e95286e66e5bc60eb04a297cff540c28de26a4d7e7b

      SHA512

      31c6473115bef34848de7ec961d9550a86a02f263504ae7c20e7487e5a052c30708b6295f86bd630f894a05a4f14dd4c26667686dfaf9dbf666c7cfa55435304

    • memory/760-12-0x0000000008670000-0x00000000087EF000-memory.dmp

      Filesize

      1.5MB

    • memory/760-27-0x00000000091B0000-0x00000000092BA000-memory.dmp

      Filesize

      1.0MB

    • memory/760-25-0x00000000091B0000-0x00000000092BA000-memory.dmp

      Filesize

      1.0MB

    • memory/760-24-0x00000000091B0000-0x00000000092BA000-memory.dmp

      Filesize

      1.0MB

    • memory/760-20-0x0000000008670000-0x00000000087EF000-memory.dmp

      Filesize

      1.5MB

    • memory/3388-21-0x00000000003B0000-0x00000000003DF000-memory.dmp

      Filesize

      188KB

    • memory/3388-14-0x0000000000330000-0x000000000038A000-memory.dmp

      Filesize

      360KB

    • memory/3388-17-0x0000000000330000-0x000000000038A000-memory.dmp

      Filesize

      360KB

    • memory/3388-18-0x00000000003B0000-0x00000000003DF000-memory.dmp

      Filesize

      188KB

    • memory/3388-19-0x0000000000EF0000-0x000000000123A000-memory.dmp

      Filesize

      3.3MB

    • memory/3388-23-0x0000000000D30000-0x0000000000DC4000-memory.dmp

      Filesize

      592KB

    • memory/4472-11-0x0000000000A10000-0x0000000000A25000-memory.dmp

      Filesize

      84KB

    • memory/4472-10-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4472-8-0x0000000000A90000-0x0000000000DDA000-memory.dmp

      Filesize

      3.3MB

    • memory/4472-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4812-6-0x0000000002250000-0x0000000002252000-memory.dmp

      Filesize

      8KB