Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe
Resource
win7-20230831-en
General
-
Target
ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe
-
Size
970KB
-
MD5
661c72c6ea35739a807366da34d0052f
-
SHA1
3eea434063b29bd161c875d4ab22ac9983c7bf6e
-
SHA256
ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3
-
SHA512
185cc33cbcb52f3dfa5029631d2fef28fd3133c115fdb9d239ead22822ca8ef5066614a405d1c079e770d55acbe2e9da70c95fb5f4f03bc75a9ebd61c4da7e67
-
SSDEEP
12288:Hh1Lk70TnvjcXn4GJmWvNgczUjmYYSHIFHpCLE+8MbElL3JWl8CnpOOXA:Tk70TrcX4zWvNPURNIFIEWbqYpO
Malware Config
Extracted
formbook
4.1
bz24
paltran.com
convadesolutions.com
smyx9b.work
friggerio.com
jndyfjc.com
dm4im2q2.top
adamloweforpresident2020.com
grvtyindustries.com
lovelycacau.com
seqizi.net
xisl88.com
dateknightdelivered.com
celebsmoaic.online
patriciolawnlandscapellc.com
liqq.asia
solutions4educators.com
hybridrate.com
newseza.com
enfejbaz9jdfthea.click
bergstromchevymadison.com
becozify.com
3a8882.com
norhenkan.net
leslie-jiang.top
bdgz.asia
lsdrw.com
stratusslides.com
jawatankosong.link
by6232.com
shenzhenjubo.com
mgt-xj-313.com
renovaro-ai.com
dvisionaryconnections.com
yyyyyt.com
oohyi.com
misslemonhotcheetoz.info
72nai.xyz
dde.ovh
genai-pubsec.com
huifeiya.com
ordermetrics.dev
ixcdex.top
mac-update.net
15659.top
aqyx.net
dtcp9900.com
syxomz.xyz
bluecarcovers.com
rottenegg.dev
zyk66.com
wiserstride.com
softwareology.online
ex-fudousan.com
spaceyplay.space
aa-012.top
m2senterprises.com
tokenbocket.pro
imtmatcher.shop
cove.directory
wilddolphinswhales.com
wooahanfamily.com
pergolassales.com
kustch.space
472persimmon7.com
aaacaw.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/2076-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2076-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2076-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2488-29-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2488-31-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2992 set thread context of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2076 set thread context of 1240 2076 aspnet_compiler.exe 12 PID 2076 set thread context of 1240 2076 aspnet_compiler.exe 12 PID 2488 set thread context of 1240 2488 chkdsk.exe 12 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
description ioc Process Key created \Registry\User\S-1-5-21-3849525425-30183055-657688904-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2076 aspnet_compiler.exe 2076 aspnet_compiler.exe 2076 aspnet_compiler.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2076 aspnet_compiler.exe 2076 aspnet_compiler.exe 2076 aspnet_compiler.exe 2076 aspnet_compiler.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe 2488 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2076 aspnet_compiler.exe Token: SeDebugPrivilege 2488 chkdsk.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 2992 wrote to memory of 2076 2992 ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe 28 PID 1240 wrote to memory of 2488 1240 Explorer.EXE 31 PID 1240 wrote to memory of 2488 1240 Explorer.EXE 31 PID 1240 wrote to memory of 2488 1240 Explorer.EXE 31 PID 1240 wrote to memory of 2488 1240 Explorer.EXE 31 PID 2488 wrote to memory of 2668 2488 chkdsk.exe 33 PID 2488 wrote to memory of 2668 2488 chkdsk.exe 33 PID 2488 wrote to memory of 2668 2488 chkdsk.exe 33 PID 2488 wrote to memory of 2668 2488 chkdsk.exe 33 PID 2488 wrote to memory of 2668 2488 chkdsk.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe"C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD53f1728163c21f0554a51536899138820
SHA1a5cfdf66f994402588492d4b223e793734ba88d7
SHA256c403e83c9b8270cc280d81e4c8585e94007850512870b886db32da8fc182e5a0
SHA51291ab0fde522d0496e11095b97a195a8f4ccee1603c4cf2b20b87c617d5c10b277cd409dc85e7c6c3e680d63636c89dd88dd77ef4959c2f0d5c77ffcff5547ec9
-
Filesize
40B
MD52f245469795b865bdd1b956c23d7893d
SHA16ad80b974d3808f5a20ea1e766c7d2f88b9e5895
SHA2561662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361
SHA512909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf