Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe
Resource
win7-20230831-en
General
-
Target
6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe
-
Size
700KB
-
MD5
32eca73388c09d03aa06f7f87602fac2
-
SHA1
8fff30284e55a9c9cf8d1838bb2158249c8f9677
-
SHA256
6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60
-
SHA512
73e74da117a4ea5fb4fe5b1d44c6733d049ec2d35250f5340b0ba7aab73bd61f282f35762745a511b9bd98bdeee2ff3de19d176905dfbd5bb65a30640206545a
-
SSDEEP
12288:wbl/Hdeyg7s9dERt9vy64AvWxSWOhf6GxK0psn7TpBi2ZUfOr5eVssmnxSGcIoH:o/HdeP7s96/dD4AF1xgosZw2ZUfO
Malware Config
Extracted
formbook
4.1
ur25
discountstoreonline.store
profitwavemastery.com
cvqqrc9j.top
easyhub.xyz
dynamicelevateemporium.online
hlcapp.com
jayanamachine.com
agyaie.com
rentthecostume.net
jvjjdjsf.top
ratce.xyz
pensoupecas.com
nnc375.xyz
beingfrankwithcash.com
simplysoaps.store
jugouqduj.top
rampageoriginal.com
tigglywinks.com
stillnightjohns.fun
exchadom002.com
doiira.com
psessential.com
meuiphone.space
permisaccelereaix.com
yadongkorea.rentals
bookesy.com
crevop.xyz
ssongg3980.cfd
lcoyngg.xyz
162197.com
humancare-bd.com
task-education.online
staffmait.com
vaclinic-aichi.com
astoriaapiary.com
163931.com
heartfulsupport.com
ssongg1669.cfd
stantonhomecomfortsolutions.com
oblastcommunity.media
bvty1646.com
nourishformen.com
j-nichols.com
cadenza.tennis
8828878.com
1ksx0i3e267z.buzz
finnsfantasticfamily.com
jantbolsosexclusivos.com
kelepirim.com
kamikacangbet.site
tiy504.com
oclairela.top
memoncollections.com
aowa.asia
edzx.asia
avalanchemode.com
haokake.top
lilypaddesigns.net
fidfaser-investment.pro
daivikd.com
huko014.com
1000plus.xyz
caballerosline.com
art-educator.com
redbeliar.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/860-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3436 set thread context of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 860 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 860 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3436 wrote to memory of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94 PID 3436 wrote to memory of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94 PID 3436 wrote to memory of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94 PID 3436 wrote to memory of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94 PID 3436 wrote to memory of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94 PID 3436 wrote to memory of 860 3436 6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe"C:\Users\Admin\AppData\Local\Temp\6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe"C:\Users\Admin\AppData\Local\Temp\6ec844914b335f0e27b9f536da5691fcc06e6ecc80d0af8dd7bc3ed8b3ee0a60_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-