Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
Drawing.exe
Resource
win7-20230831-en
General
-
Target
Drawing.exe
-
Size
603KB
-
MD5
9edfa017d41749f89e3ed03de95be047
-
SHA1
a4ff313cafc64343ffa7afe7ff03fe9f872ab28a
-
SHA256
b196af30d4f938648c5c626b0c578d73d7d1c4f09b2228800ca78744bf508c06
-
SHA512
82c24694b21c70096fc8eb5d8dfedf73b03fc88e12206fc8457585fe60b92e72a94d523ab0dc2f1196ef204f90557f5d5360772fce5264440e657b0e22ece68c
-
SSDEEP
12288:NtHzPrD6MqJ0yadE1dewjSVbJKKGIQh7/xPM7cNmU6:njDZq6dEKJKrIQh7/oU6
Malware Config
Extracted
formbook
4.1
go95
shellveil.com
digitaldame.shop
gsqjrl.top
freitasfamilylaw.com
alliancetransportllc.com
connecthospitality.work
awwaloon.com
fomohour.xyz
sjapkhuf.top
designmcraft.com
travelguidanceer.pro
vejashoessuomi.com
smallsipsteel.com
hallowedhavenstudios.com
bestonsports.com
touxiong53a.com
azgskyhvz4.top
strategicroulette.com
69farma.com
cosmosoftventures.com
ssongg872.cfd
integralfit.net
ewapalucka.com
openstakeholder.com
ssongg258.cfd
gunacilix.online
snirvacampo.pro
gasengi.live
you-rediscovered.com
nbazxop.xyz
kambingtoto.com
xiurenwang.club
ragattidesign.com
extraplusdigital.com
turbifypro.com
smm79.xyz
glitterplugbeats.com
laurylee.com
cincyqhi.com
cncqj.com
onlinesports.store
zhongtuo63.com
kombicrash.com
rockytopspiritsco.com
tap10.app
danielhen.com
fredasante.com
virginiadish.com
talktoapm.com
urdcs.cfd
89vh.xyz
theascnedancygroup.com
loadedreview.com
forgingbridgesattr.com
182jj.xyz
ycfzw.com
appoficialnovo.shop
cantrillart.com
rrproperty.net
pluribusmarketing.com
nuvanta.net
blamewho.com
hotshift.show
sharesgram.com
csshotelsystems.com
Signatures
-
Formbook payload 6 IoCs
resource yara_rule behavioral1/memory/2488-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2488-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2488-33-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/552-40-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2620-43-0x00000000023B0000-0x00000000023F0000-memory.dmp formbook behavioral1/memory/552-45-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2008 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2572 set thread context of 2488 2572 Drawing.exe 35 PID 2488 set thread context of 1344 2488 Drawing.exe 7 PID 2488 set thread context of 1344 2488 Drawing.exe 7 PID 552 set thread context of 1344 552 svchost.exe 7 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2648 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2572 Drawing.exe 2572 Drawing.exe 2488 Drawing.exe 2488 Drawing.exe 2488 Drawing.exe 552 svchost.exe 552 svchost.exe 2620 powershell.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe 552 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1344 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2488 Drawing.exe 2488 Drawing.exe 2488 Drawing.exe 2488 Drawing.exe 552 svchost.exe 552 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2572 Drawing.exe Token: SeDebugPrivilege 2488 Drawing.exe Token: SeDebugPrivilege 552 svchost.exe Token: SeDebugPrivilege 2620 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2620 2572 Drawing.exe 30 PID 2572 wrote to memory of 2620 2572 Drawing.exe 30 PID 2572 wrote to memory of 2620 2572 Drawing.exe 30 PID 2572 wrote to memory of 2620 2572 Drawing.exe 30 PID 2572 wrote to memory of 2648 2572 Drawing.exe 32 PID 2572 wrote to memory of 2648 2572 Drawing.exe 32 PID 2572 wrote to memory of 2648 2572 Drawing.exe 32 PID 2572 wrote to memory of 2648 2572 Drawing.exe 32 PID 2572 wrote to memory of 2600 2572 Drawing.exe 34 PID 2572 wrote to memory of 2600 2572 Drawing.exe 34 PID 2572 wrote to memory of 2600 2572 Drawing.exe 34 PID 2572 wrote to memory of 2600 2572 Drawing.exe 34 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2572 wrote to memory of 2488 2572 Drawing.exe 35 PID 2488 wrote to memory of 552 2488 Drawing.exe 36 PID 2488 wrote to memory of 552 2488 Drawing.exe 36 PID 2488 wrote to memory of 552 2488 Drawing.exe 36 PID 2488 wrote to memory of 552 2488 Drawing.exe 36 PID 552 wrote to memory of 2008 552 svchost.exe 37 PID 552 wrote to memory of 2008 552 svchost.exe 37 PID 552 wrote to memory of 2008 552 svchost.exe 37 PID 552 wrote to memory of 2008 552 svchost.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\Drawing.exe"C:\Users\Admin\AppData\Local\Temp\Drawing.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NKLDrvsKeZqp.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NKLDrvsKeZqp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp696D.tmp"3⤵
- Creates scheduled task(s)
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\Drawing.exe"C:\Users\Admin\AppData\Local\Temp\Drawing.exe"3⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\Drawing.exe"C:\Users\Admin\AppData\Local\Temp\Drawing.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"5⤵
- Deletes itself
PID:2008
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c4bb5968d4b9c300de7a55dd1cd3d48
SHA1b6563dda82201bf0e3fd2c0dc31ad97d78c8183f
SHA25672ca9d6115eb57b4c4fa161305d6fcee40084901750a7be2b4b522182269b6a8
SHA512270be411611cf48e8a17f9b6d95723e86e6de259125a2e24bf6c519d6196402122a44bb8b5735dbcf7e39396c8b1c118fb877bcc7edd9add812527e64f4e383d