Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2023, 02:57

General

  • Target

    RFQ_Brazil.exe

  • Size

    665KB

  • MD5

    8c9063c775cdc83e37cc1627c2db4e35

  • SHA1

    fdb299c90896fe4da7296eea45e435eeaea01a93

  • SHA256

    ee68eb97a5b52851a5154c7078391f42c63dc93e093cfce520f57146bc1b2973

  • SHA512

    7deb68cc997fd3e049654c42c294317ab881ba72cb6bcb9d4ce0f499594d9c2a3a49125a217761c4a8d712e7838a50533bda464270cd309f3075fefe8fd91ae1

  • SSDEEP

    12288:+6n+XfJw1UN1PLRksi04MgJjIMbDu5innGNMd4MxajKRM9Hg:DKBw+JNc0EtSq5PIH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m0u5

Decoy

thefdigroup.com

ashirovinc.com

nbkbj.com

sundirect.cloud

watertreegirls.com

transportevolpara.com

shohagit.com

warna99.net

infsodex.online

fansjolt.com

ourrajasthan.com

secretgardenbuys.com

italyimportvinhos.com

gxzfwx.com

aujhgk.buzz

75313a.com

tertians.com

asansys.net

jacksonsportsmemorabilia.com

globalkamp305.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2804
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:2656
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:2572
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:684
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:2528
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:2564
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:2536
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:2520
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:2632
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:2640
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:2592
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:3000
                          • C:\Windows\SysWOW64\wlanext.exe
                            "C:\Windows\SysWOW64\wlanext.exe"
                            2⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3056
                            • C:\Windows\SysWOW64\cmd.exe
                              /c del "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"
                              3⤵
                              • Deletes itself
                              PID:1756

                        Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/1276-37-0x0000000007080000-0x00000000071DF000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1276-17-0x0000000000010000-0x0000000000020000-memory.dmp

                          Filesize

                          64KB

                        • memory/1276-24-0x0000000006470000-0x0000000006555000-memory.dmp

                          Filesize

                          916KB

                        • memory/1276-30-0x0000000006470000-0x0000000006555000-memory.dmp

                          Filesize

                          916KB

                        • memory/1276-19-0x0000000006690000-0x00000000067BC000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1276-33-0x0000000000010000-0x0000000000020000-memory.dmp

                          Filesize

                          64KB

                        • memory/1276-34-0x0000000007080000-0x00000000071DF000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1276-35-0x0000000007080000-0x00000000071DF000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/1748-4-0x0000000074130000-0x000000007481E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/1748-7-0x0000000005230000-0x000000000529E000-memory.dmp

                          Filesize

                          440KB

                        • memory/1748-6-0x0000000000500000-0x000000000050A000-memory.dmp

                          Filesize

                          40KB

                        • memory/1748-5-0x0000000004F40000-0x0000000004F80000-memory.dmp

                          Filesize

                          256KB

                        • memory/1748-13-0x0000000074130000-0x000000007481E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/1748-3-0x00000000004E0000-0x00000000004F8000-memory.dmp

                          Filesize

                          96KB

                        • memory/1748-2-0x0000000004F40000-0x0000000004F80000-memory.dmp

                          Filesize

                          256KB

                        • memory/1748-1-0x0000000074130000-0x000000007481E000-memory.dmp

                          Filesize

                          6.9MB

                        • memory/1748-0-0x0000000001300000-0x00000000013AA000-memory.dmp

                          Filesize

                          680KB

                        • memory/2804-18-0x0000000000180000-0x0000000000195000-memory.dmp

                          Filesize

                          84KB

                        • memory/2804-14-0x0000000000AA0000-0x0000000000DA3000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/2804-21-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2804-16-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2804-8-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2804-9-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/2804-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                          Filesize

                          4KB

                        • memory/2804-22-0x00000000001D0000-0x00000000001E5000-memory.dmp

                          Filesize

                          84KB

                        • memory/2804-12-0x0000000000400000-0x000000000042F000-memory.dmp

                          Filesize

                          188KB

                        • memory/3056-28-0x0000000001DA0000-0x00000000020A3000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/3056-32-0x00000000020B0000-0x0000000002144000-memory.dmp

                          Filesize

                          592KB

                        • memory/3056-29-0x00000000000B0000-0x00000000000DF000-memory.dmp

                          Filesize

                          188KB

                        • memory/3056-27-0x00000000000B0000-0x00000000000DF000-memory.dmp

                          Filesize

                          188KB

                        • memory/3056-26-0x0000000000090000-0x00000000000A6000-memory.dmp

                          Filesize

                          88KB

                        • memory/3056-25-0x0000000000090000-0x00000000000A6000-memory.dmp

                          Filesize

                          88KB