Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 22:21

General

  • Target

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe

  • Size

    970KB

  • MD5

    661c72c6ea35739a807366da34d0052f

  • SHA1

    3eea434063b29bd161c875d4ab22ac9983c7bf6e

  • SHA256

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3

  • SHA512

    185cc33cbcb52f3dfa5029631d2fef28fd3133c115fdb9d239ead22822ca8ef5066614a405d1c079e770d55acbe2e9da70c95fb5f4f03bc75a9ebd61c4da7e67

  • SSDEEP

    12288:Hh1Lk70TnvjcXn4GJmWvNgczUjmYYSHIFHpCLE+8MbElL3JWl8CnpOOXA:Tk70TrcX4zWvNPURNIFIEWbqYpO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bz24

Decoy

paltran.com

convadesolutions.com

smyx9b.work

friggerio.com

jndyfjc.com

dm4im2q2.top

adamloweforpresident2020.com

grvtyindustries.com

lovelycacau.com

seqizi.net

xisl88.com

dateknightdelivered.com

celebsmoaic.online

patriciolawnlandscapellc.com

liqq.asia

solutions4educators.com

hybridrate.com

newseza.com

enfejbaz9jdfthea.click

bergstromchevymadison.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:2076
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogim.jpeg

      Filesize

      71KB

      MD5

      3f1728163c21f0554a51536899138820

      SHA1

      a5cfdf66f994402588492d4b223e793734ba88d7

      SHA256

      c403e83c9b8270cc280d81e4c8585e94007850512870b886db32da8fc182e5a0

      SHA512

      91ab0fde522d0496e11095b97a195a8f4ccee1603c4cf2b20b87c617d5c10b277cd409dc85e7c6c3e680d63636c89dd88dd77ef4959c2f0d5c77ffcff5547ec9

    • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrf.ini

      Filesize

      40B

      MD5

      2f245469795b865bdd1b956c23d7893d

      SHA1

      6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

      SHA256

      1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

      SHA512

      909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

    • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogri.ini

      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrv.ini

      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • memory/1240-25-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1240-41-0x0000000006BD0000-0x0000000006CD8000-memory.dmp

      Filesize

      1.0MB

    • memory/1240-39-0x0000000006BD0000-0x0000000006CD8000-memory.dmp

      Filesize

      1.0MB

    • memory/1240-38-0x0000000006BD0000-0x0000000006CD8000-memory.dmp

      Filesize

      1.0MB

    • memory/1240-35-0x0000000003D10000-0x0000000003E5F000-memory.dmp

      Filesize

      1.3MB

    • memory/1240-26-0x0000000003D10000-0x0000000003E5F000-memory.dmp

      Filesize

      1.3MB

    • memory/1240-21-0x0000000006240000-0x00000000063DD000-memory.dmp

      Filesize

      1.6MB

    • memory/2076-12-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2076-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2076-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2076-10-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2076-17-0x0000000000AA0000-0x0000000000DA3000-memory.dmp

      Filesize

      3.0MB

    • memory/2076-19-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2076-20-0x0000000000140000-0x0000000000155000-memory.dmp

      Filesize

      84KB

    • memory/2076-24-0x00000000001F0000-0x0000000000205000-memory.dmp

      Filesize

      84KB

    • memory/2076-23-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2488-31-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2488-37-0x0000000000A30000-0x0000000000AC4000-memory.dmp

      Filesize

      592KB

    • memory/2488-30-0x0000000002380000-0x0000000002683000-memory.dmp

      Filesize

      3.0MB

    • memory/2488-27-0x0000000000F70000-0x0000000000F77000-memory.dmp

      Filesize

      28KB

    • memory/2488-28-0x0000000000F70000-0x0000000000F77000-memory.dmp

      Filesize

      28KB

    • memory/2488-29-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2992-9-0x00000000020F0000-0x00000000020FA000-memory.dmp

      Filesize

      40KB

    • memory/2992-0-0x0000000074150000-0x000000007483E000-memory.dmp

      Filesize

      6.9MB

    • memory/2992-8-0x0000000002390000-0x00000000023D0000-memory.dmp

      Filesize

      256KB

    • memory/2992-16-0x0000000074150000-0x000000007483E000-memory.dmp

      Filesize

      6.9MB

    • memory/2992-7-0x0000000002390000-0x00000000023D0000-memory.dmp

      Filesize

      256KB

    • memory/2992-6-0x0000000002390000-0x00000000023D0000-memory.dmp

      Filesize

      256KB

    • memory/2992-5-0x0000000074150000-0x000000007483E000-memory.dmp

      Filesize

      6.9MB

    • memory/2992-4-0x00000000049C0000-0x0000000004A76000-memory.dmp

      Filesize

      728KB

    • memory/2992-3-0x0000000002390000-0x00000000023D0000-memory.dmp

      Filesize

      256KB

    • memory/2992-2-0x0000000004A70000-0x0000000004B26000-memory.dmp

      Filesize

      728KB

    • memory/2992-1-0x0000000002390000-0x00000000023D0000-memory.dmp

      Filesize

      256KB