Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:47

General

  • Target

    Drawing.exe

  • Size

    603KB

  • MD5

    9edfa017d41749f89e3ed03de95be047

  • SHA1

    a4ff313cafc64343ffa7afe7ff03fe9f872ab28a

  • SHA256

    b196af30d4f938648c5c626b0c578d73d7d1c4f09b2228800ca78744bf508c06

  • SHA512

    82c24694b21c70096fc8eb5d8dfedf73b03fc88e12206fc8457585fe60b92e72a94d523ab0dc2f1196ef204f90557f5d5360772fce5264440e657b0e22ece68c

  • SSDEEP

    12288:NtHzPrD6MqJ0yadE1dewjSVbJKKGIQh7/xPM7cNmU6:njDZq6dEKJKrIQh7/oU6

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

go95

Decoy

shellveil.com

digitaldame.shop

gsqjrl.top

freitasfamilylaw.com

alliancetransportllc.com

connecthospitality.work

awwaloon.com

fomohour.xyz

sjapkhuf.top

designmcraft.com

travelguidanceer.pro

vejashoessuomi.com

smallsipsteel.com

hallowedhavenstudios.com

bestonsports.com

touxiong53a.com

azgskyhvz4.top

strategicroulette.com

69farma.com

cosmosoftventures.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 6 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
      "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NKLDrvsKeZqp.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2620
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NKLDrvsKeZqp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp696D.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
        "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
        3⤵
          PID:2600
        • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
          "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\SysWOW64\svchost.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
              5⤵
              • Deletes itself
              PID:2008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp696D.tmp

      Filesize

      1KB

      MD5

      7c4bb5968d4b9c300de7a55dd1cd3d48

      SHA1

      b6563dda82201bf0e3fd2c0dc31ad97d78c8183f

      SHA256

      72ca9d6115eb57b4c4fa161305d6fcee40084901750a7be2b4b522182269b6a8

      SHA512

      270be411611cf48e8a17f9b6d95723e86e6de259125a2e24bf6c519d6196402122a44bb8b5735dbcf7e39396c8b1c118fb877bcc7edd9add812527e64f4e383d

    • memory/552-44-0x0000000000830000-0x0000000000B33000-memory.dmp

      Filesize

      3.0MB

    • memory/552-48-0x0000000000650000-0x00000000006E3000-memory.dmp

      Filesize

      588KB

    • memory/552-45-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/552-40-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/552-39-0x0000000000820000-0x0000000000828000-memory.dmp

      Filesize

      32KB

    • memory/552-38-0x0000000000820000-0x0000000000828000-memory.dmp

      Filesize

      32KB

    • memory/1344-51-0x00000000092E0000-0x0000000009403000-memory.dmp

      Filesize

      1.1MB

    • memory/1344-49-0x00000000092E0000-0x0000000009403000-memory.dmp

      Filesize

      1.1MB

    • memory/1344-22-0x0000000002C50000-0x0000000002D50000-memory.dmp

      Filesize

      1024KB

    • memory/1344-53-0x00000000092E0000-0x0000000009403000-memory.dmp

      Filesize

      1.1MB

    • memory/1344-35-0x00000000087E0000-0x000000000890B000-memory.dmp

      Filesize

      1.2MB

    • memory/1344-32-0x0000000002C50000-0x0000000002D50000-memory.dmp

      Filesize

      1024KB

    • memory/1344-24-0x00000000086C0000-0x00000000087DC000-memory.dmp

      Filesize

      1.1MB

    • memory/2488-14-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2488-33-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2488-21-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2488-23-0x00000000001D0000-0x00000000001E4000-memory.dmp

      Filesize

      80KB

    • memory/2488-18-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2488-19-0x0000000000910000-0x0000000000C13000-memory.dmp

      Filesize

      3.0MB

    • memory/2488-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2488-34-0x00000000002D0000-0x00000000002E4000-memory.dmp

      Filesize

      80KB

    • memory/2488-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2572-5-0x0000000005020000-0x0000000005060000-memory.dmp

      Filesize

      256KB

    • memory/2572-6-0x0000000000350000-0x000000000035A000-memory.dmp

      Filesize

      40KB

    • memory/2572-1-0x00000000010E0000-0x000000000117E000-memory.dmp

      Filesize

      632KB

    • memory/2572-2-0x0000000005020000-0x0000000005060000-memory.dmp

      Filesize

      256KB

    • memory/2572-3-0x00000000003A0000-0x00000000003BA000-memory.dmp

      Filesize

      104KB

    • memory/2572-4-0x0000000074430000-0x0000000074B1E000-memory.dmp

      Filesize

      6.9MB

    • memory/2572-0-0x0000000074430000-0x0000000074B1E000-memory.dmp

      Filesize

      6.9MB

    • memory/2572-8-0x0000000005C90000-0x0000000005CFE000-memory.dmp

      Filesize

      440KB

    • memory/2572-7-0x0000000000440000-0x000000000044C000-memory.dmp

      Filesize

      48KB

    • memory/2572-25-0x0000000074430000-0x0000000074B1E000-memory.dmp

      Filesize

      6.9MB

    • memory/2620-37-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2620-43-0x00000000023B0000-0x00000000023F0000-memory.dmp

      Filesize

      256KB

    • memory/2620-42-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2620-41-0x00000000023B0000-0x00000000023F0000-memory.dmp

      Filesize

      256KB

    • memory/2620-46-0x00000000023B0000-0x00000000023F0000-memory.dmp

      Filesize

      256KB

    • memory/2620-30-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2620-47-0x00000000023B0000-0x00000000023F0000-memory.dmp

      Filesize

      256KB

    • memory/2620-36-0x00000000023B0000-0x00000000023F0000-memory.dmp

      Filesize

      256KB

    • memory/2620-28-0x0000000074570000-0x0000000074B1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2620-29-0x00000000023B0000-0x00000000023F0000-memory.dmp

      Filesize

      256KB