Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_Brazil.exe
Resource
win7-20230831-en
General
-
Target
RFQ_Brazil.exe
-
Size
665KB
-
MD5
8c9063c775cdc83e37cc1627c2db4e35
-
SHA1
fdb299c90896fe4da7296eea45e435eeaea01a93
-
SHA256
ee68eb97a5b52851a5154c7078391f42c63dc93e093cfce520f57146bc1b2973
-
SHA512
7deb68cc997fd3e049654c42c294317ab881ba72cb6bcb9d4ce0f499594d9c2a3a49125a217761c4a8d712e7838a50533bda464270cd309f3075fefe8fd91ae1
-
SSDEEP
12288:+6n+XfJw1UN1PLRksi04MgJjIMbDu5innGNMd4MxajKRM9Hg:DKBw+JNc0EtSq5PIH
Malware Config
Extracted
formbook
4.1
m0u5
thefdigroup.com
ashirovinc.com
nbkbj.com
sundirect.cloud
watertreegirls.com
transportevolpara.com
shohagit.com
warna99.net
infsodex.online
fansjolt.com
ourrajasthan.com
secretgardenbuys.com
italyimportvinhos.com
gxzfwx.com
aujhgk.buzz
75313a.com
tertians.com
asansys.net
jacksonsportsmemorabilia.com
globalkamp305.com
2889388.com
houseofbrands.info
nicebatting.com
multconversa.net
topdelta9.com
hyatth.com
doop.store
7jr5z3sq.click
teachingmetech.com
cinema24hd.com
twsyywvz.click
shoptidyhaven.com
heartfulhealingandwellness.com
nowpropel.com
lpmvacationvillas.com
musclemagnate.com
qpicusa.online
wolfonic.com
southwaltoncity.com
poicxz.xyz
azoden.com
spphn.com
collinshumaker.com
spotlightand.com
skillfixr.com
royalplywoods.com
florencemedicareagency.com
elixirjuicessv.com
deluxert.shop
flexicapitals.com
orvmanga.com
kaijurust.com
baodainovel.com
513943440.xyz
worldwidelogisticsco.com
fhmixtvh.click
gilbertdoggroomer.com
yth00001.com
canyouwoohoo.com
heraldmechanic.com
page-to-starts-game.website
lynkeechow.net
paigejaphet.shop
jokerbet550.com
usiclfdl.click
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2804-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2804-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2804-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3056-27-0x00000000000B0000-0x00000000000DF000-memory.dmp formbook behavioral1/memory/3056-29-0x00000000000B0000-0x00000000000DF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1756 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1748 set thread context of 2804 1748 RFQ_Brazil.exe 30 PID 2804 set thread context of 1276 2804 RFQ_Brazil.exe 13 PID 2804 set thread context of 1276 2804 RFQ_Brazil.exe 13 PID 3056 set thread context of 1276 3056 wlanext.exe 13 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1748 RFQ_Brazil.exe 1748 RFQ_Brazil.exe 1748 RFQ_Brazil.exe 1748 RFQ_Brazil.exe 1748 RFQ_Brazil.exe 1748 RFQ_Brazil.exe 1748 RFQ_Brazil.exe 2804 RFQ_Brazil.exe 2804 RFQ_Brazil.exe 2804 RFQ_Brazil.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe 3056 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2804 RFQ_Brazil.exe 2804 RFQ_Brazil.exe 2804 RFQ_Brazil.exe 2804 RFQ_Brazil.exe 3056 wlanext.exe 3056 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1748 RFQ_Brazil.exe Token: SeDebugPrivilege 2804 RFQ_Brazil.exe Token: SeDebugPrivilege 3056 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1748 wrote to memory of 2804 1748 RFQ_Brazil.exe 30 PID 1276 wrote to memory of 3056 1276 Explorer.EXE 42 PID 1276 wrote to memory of 3056 1276 Explorer.EXE 42 PID 1276 wrote to memory of 3056 1276 Explorer.EXE 42 PID 1276 wrote to memory of 3056 1276 Explorer.EXE 42 PID 3056 wrote to memory of 1756 3056 wlanext.exe 43 PID 3056 wrote to memory of 1756 3056 wlanext.exe 43 PID 3056 wrote to memory of 1756 3056 wlanext.exe 43 PID 3056 wrote to memory of 1756 3056 wlanext.exe 43
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2656
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2572
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:684
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2528
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2564
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2536
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2520
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2632
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2640
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2592
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3000
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"3⤵
- Deletes itself
PID:1756
-
-