Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2023, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
TNT Shipping Document.exe
Resource
win7-20230831-en
General
-
Target
TNT Shipping Document.exe
-
Size
620KB
-
MD5
0593245b016a4aabdd56134224efa148
-
SHA1
62aa8ce315251c033878e82324d786dc2c2f2ec1
-
SHA256
ff87df006fb01a3f40c3eaa5f64efbb699378e096c28d4179eb5b3c023774acc
-
SHA512
f5391c70a233be9568d252e8b920cec388817c04ab3a7dfc691c3b1e68743ed46db3261eb1080053b207631cb5e45e5226443ee64b8ed8c989a334f4652e6e2a
-
SSDEEP
12288:/UZqEisUH/iA0ZTCFmTGpU3TEtxQ4CcH0R5SH9+yF05IyrsgpWVa6AJ/qn:qqEWpuCY/3T3jEd+e05IEhpF6+qn
Malware Config
Extracted
formbook
4.1
cy12
routinelywell.com
traderinformation.com
xv1lz.cfd
elfiensclinic.com
dfwtexasmilitaryagent.com
gb3p8a.com
ofcure.com
kslgd.link
apexassisthubs.com
270hg.com
spacovitta.com
mattress-info-hu-kwu.today
jakestarrbroadcast.com
modestswimwearshop.com
game0814.com
gec.tokyo
growwellnesscoaching.com
thefavoreats.com
gaasmantech.net
mloffers.net
sarahklimekrealty.com
fnykl2.com
nuomingjs.com
thewanderingbarfly.com
affiliatebrokers.cloud
yourdesignneed.com
360expantion.com
burumakansatunikki.com
hh870.bio
com-safe.site
ssongg4134.cfd
juntocrecemosalinstante.top
poorexcuses.com
stargear.top
ktobr.live
s5266m.com
paragon-cto.net
luohuigroup.com
srspicture.com
jounce.space
otrnton.top
jhaganjr.com
eshebrown.com
mc-ibit.com
rundlestreetkenttown.net
ssongg3132.cfd
thedivorcelawyer.website
ipcontrolsas.com
ungravity.dev
vigne.tattoo
modcoops.com
earthbondproperty.com
pachinko-and-slot.tokyo
pp88money.com
mysweettangrine.com
barbieinterviews.com
aimageabove.com
hamidconstruction.com
xcolpuj.xyz
xxxvedio.online
ceracasas.com
mariaelamine.com
eew.lat
pmugly.top
withscreamandsugar.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4400-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4400-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3748-23-0x0000000000600000-0x000000000062F000-memory.dmp formbook behavioral2/memory/3748-25-0x0000000000600000-0x000000000062F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 472 set thread context of 4400 472 TNT Shipping Document.exe 91 PID 4400 set thread context of 3088 4400 TNT Shipping Document.exe 62 PID 3748 set thread context of 3088 3748 systray.exe 62 -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 472 TNT Shipping Document.exe 472 TNT Shipping Document.exe 472 TNT Shipping Document.exe 472 TNT Shipping Document.exe 472 TNT Shipping Document.exe 472 TNT Shipping Document.exe 4400 TNT Shipping Document.exe 4400 TNT Shipping Document.exe 4400 TNT Shipping Document.exe 4400 TNT Shipping Document.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe 3748 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3088 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4400 TNT Shipping Document.exe 4400 TNT Shipping Document.exe 4400 TNT Shipping Document.exe 3748 systray.exe 3748 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 472 TNT Shipping Document.exe Token: SeDebugPrivilege 4400 TNT Shipping Document.exe Token: SeDebugPrivilege 3748 systray.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3088 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 472 wrote to memory of 3816 472 TNT Shipping Document.exe 89 PID 472 wrote to memory of 3816 472 TNT Shipping Document.exe 89 PID 472 wrote to memory of 3816 472 TNT Shipping Document.exe 89 PID 472 wrote to memory of 1808 472 TNT Shipping Document.exe 90 PID 472 wrote to memory of 1808 472 TNT Shipping Document.exe 90 PID 472 wrote to memory of 1808 472 TNT Shipping Document.exe 90 PID 472 wrote to memory of 4400 472 TNT Shipping Document.exe 91 PID 472 wrote to memory of 4400 472 TNT Shipping Document.exe 91 PID 472 wrote to memory of 4400 472 TNT Shipping Document.exe 91 PID 472 wrote to memory of 4400 472 TNT Shipping Document.exe 91 PID 472 wrote to memory of 4400 472 TNT Shipping Document.exe 91 PID 472 wrote to memory of 4400 472 TNT Shipping Document.exe 91 PID 3088 wrote to memory of 3748 3088 Explorer.EXE 92 PID 3088 wrote to memory of 3748 3088 Explorer.EXE 92 PID 3088 wrote to memory of 3748 3088 Explorer.EXE 92 PID 3748 wrote to memory of 4748 3748 systray.exe 94 PID 3748 wrote to memory of 4748 3748 systray.exe 94 PID 3748 wrote to memory of 4748 3748 systray.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"3⤵PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"3⤵PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\TNT Shipping Document.exe"3⤵PID:4748
-
-