Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    204s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 04:47

General

  • Target

    Drawing.exe

  • Size

    603KB

  • MD5

    9edfa017d41749f89e3ed03de95be047

  • SHA1

    a4ff313cafc64343ffa7afe7ff03fe9f872ab28a

  • SHA256

    b196af30d4f938648c5c626b0c578d73d7d1c4f09b2228800ca78744bf508c06

  • SHA512

    82c24694b21c70096fc8eb5d8dfedf73b03fc88e12206fc8457585fe60b92e72a94d523ab0dc2f1196ef204f90557f5d5360772fce5264440e657b0e22ece68c

  • SSDEEP

    12288:NtHzPrD6MqJ0yadE1dewjSVbJKKGIQh7/xPM7cNmU6:njDZq6dEKJKrIQh7/oU6

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

go95

Decoy

shellveil.com

digitaldame.shop

gsqjrl.top

freitasfamilylaw.com

alliancetransportllc.com

connecthospitality.work

awwaloon.com

fomohour.xyz

sjapkhuf.top

designmcraft.com

travelguidanceer.pro

vejashoessuomi.com

smallsipsteel.com

hallowedhavenstudios.com

bestonsports.com

touxiong53a.com

azgskyhvz4.top

strategicroulette.com

69farma.com

cosmosoftventures.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3324
    • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
      "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NKLDrvsKeZqp.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NKLDrvsKeZqp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6B14.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2344
      • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
        "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3296
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
        3⤵
          PID:1768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gpqkhfcj.ggl.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp6B14.tmp

      Filesize

      1KB

      MD5

      4363a36b101b47ca0d2cc5f94c27e3d2

      SHA1

      e305bbc35b19a7ab5e823a4f74247189b482135d

      SHA256

      a0ab2b19f92bb0e3146b2fa749a65dbd06e113df5c4b92e10df34450ed6d3fb5

      SHA512

      b425ef203fa5e3cb57a8bcfb5b9febfe2b8da220de2c7507453fc3ade67e6a144a7407d9209efb4091e32e1deb52fe4e83398a98228d7dbce26769c2c4189c1b

    • memory/64-10-0x00000000060F0000-0x00000000060FC000-memory.dmp

      Filesize

      48KB

    • memory/64-11-0x0000000009460000-0x00000000094CE000-memory.dmp

      Filesize

      440KB

    • memory/64-4-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/64-5-0x0000000004E90000-0x0000000004E9A000-memory.dmp

      Filesize

      40KB

    • memory/64-6-0x00000000092B0000-0x00000000092CA000-memory.dmp

      Filesize

      104KB

    • memory/64-7-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/64-8-0x0000000004F00000-0x0000000004F10000-memory.dmp

      Filesize

      64KB

    • memory/64-9-0x00000000060E0000-0x00000000060EA000-memory.dmp

      Filesize

      40KB

    • memory/64-1-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/64-3-0x0000000004CE0000-0x0000000004D72000-memory.dmp

      Filesize

      584KB

    • memory/64-12-0x000000000BD30000-0x000000000BDCC000-memory.dmp

      Filesize

      624KB

    • memory/64-2-0x00000000051B0000-0x0000000005754000-memory.dmp

      Filesize

      5.6MB

    • memory/64-37-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/64-0-0x0000000000250000-0x00000000002EE000-memory.dmp

      Filesize

      632KB

    • memory/3296-39-0x0000000000F00000-0x000000000124A000-memory.dmp

      Filesize

      3.3MB

    • memory/3296-42-0x0000000000A80000-0x0000000000A94000-memory.dmp

      Filesize

      80KB

    • memory/3296-41-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3296-24-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3324-64-0x0000000008C10000-0x0000000008D25000-memory.dmp

      Filesize

      1.1MB

    • memory/3324-63-0x0000000008C10000-0x0000000008D25000-memory.dmp

      Filesize

      1.1MB

    • memory/3324-67-0x0000000008C10000-0x0000000008D25000-memory.dmp

      Filesize

      1.1MB

    • memory/3324-43-0x0000000008B20000-0x0000000008C10000-memory.dmp

      Filesize

      960KB

    • memory/4372-57-0x0000000000F30000-0x0000000000F5F000-memory.dmp

      Filesize

      188KB

    • memory/4372-54-0x0000000001C00000-0x0000000001F4A000-memory.dmp

      Filesize

      3.3MB

    • memory/4372-59-0x0000000000F30000-0x0000000000F5F000-memory.dmp

      Filesize

      188KB

    • memory/4372-62-0x0000000001AA0000-0x0000000001B33000-memory.dmp

      Filesize

      588KB

    • memory/4372-51-0x0000000000F30000-0x0000000000F5F000-memory.dmp

      Filesize

      188KB

    • memory/4372-47-0x0000000000470000-0x000000000047E000-memory.dmp

      Filesize

      56KB

    • memory/4372-49-0x0000000000470000-0x000000000047E000-memory.dmp

      Filesize

      56KB

    • memory/4984-18-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-46-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/4984-45-0x0000000006630000-0x000000000667C000-memory.dmp

      Filesize

      304KB

    • memory/4984-44-0x00000000065D0000-0x00000000065EE000-memory.dmp

      Filesize

      120KB

    • memory/4984-50-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB

    • memory/4984-38-0x00000000060E0000-0x0000000006434000-memory.dmp

      Filesize

      3.3MB

    • memory/4984-52-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/4984-53-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/4984-25-0x0000000005F00000-0x0000000005F66000-memory.dmp

      Filesize

      408KB

    • memory/4984-56-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/4984-27-0x0000000005F70000-0x0000000005FD6000-memory.dmp

      Filesize

      408KB

    • memory/4984-23-0x0000000005E30000-0x0000000005E52000-memory.dmp

      Filesize

      136KB

    • memory/4984-22-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/4984-21-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/4984-19-0x00000000056D0000-0x0000000005CF8000-memory.dmp

      Filesize

      6.2MB

    • memory/4984-17-0x0000000004FF0000-0x0000000005026000-memory.dmp

      Filesize

      216KB

    • memory/4984-69-0x000000007EF00000-0x000000007EF10000-memory.dmp

      Filesize

      64KB

    • memory/4984-70-0x0000000007790000-0x00000000077C2000-memory.dmp

      Filesize

      200KB

    • memory/4984-71-0x0000000075BA0000-0x0000000075BEC000-memory.dmp

      Filesize

      304KB

    • memory/4984-81-0x0000000006B90000-0x0000000006BAE000-memory.dmp

      Filesize

      120KB

    • memory/4984-82-0x00000000077D0000-0x0000000007873000-memory.dmp

      Filesize

      652KB

    • memory/4984-83-0x0000000007F30000-0x00000000085AA000-memory.dmp

      Filesize

      6.5MB

    • memory/4984-84-0x00000000078F0000-0x000000000790A000-memory.dmp

      Filesize

      104KB

    • memory/4984-85-0x0000000007950000-0x000000000795A000-memory.dmp

      Filesize

      40KB

    • memory/4984-86-0x0000000007B80000-0x0000000007C16000-memory.dmp

      Filesize

      600KB

    • memory/4984-87-0x0000000007AF0000-0x0000000007B01000-memory.dmp

      Filesize

      68KB

    • memory/4984-88-0x0000000007B30000-0x0000000007B3E000-memory.dmp

      Filesize

      56KB

    • memory/4984-89-0x0000000007B40000-0x0000000007B54000-memory.dmp

      Filesize

      80KB

    • memory/4984-90-0x0000000007C20000-0x0000000007C3A000-memory.dmp

      Filesize

      104KB

    • memory/4984-91-0x0000000007B70000-0x0000000007B78000-memory.dmp

      Filesize

      32KB

    • memory/4984-93-0x0000000075310000-0x0000000075AC0000-memory.dmp

      Filesize

      7.7MB