Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
Drawing.exe
Resource
win7-20230831-en
General
-
Target
Drawing.exe
-
Size
603KB
-
MD5
9edfa017d41749f89e3ed03de95be047
-
SHA1
a4ff313cafc64343ffa7afe7ff03fe9f872ab28a
-
SHA256
b196af30d4f938648c5c626b0c578d73d7d1c4f09b2228800ca78744bf508c06
-
SHA512
82c24694b21c70096fc8eb5d8dfedf73b03fc88e12206fc8457585fe60b92e72a94d523ab0dc2f1196ef204f90557f5d5360772fce5264440e657b0e22ece68c
-
SSDEEP
12288:NtHzPrD6MqJ0yadE1dewjSVbJKKGIQh7/xPM7cNmU6:njDZq6dEKJKrIQh7/oU6
Malware Config
Extracted
formbook
4.1
go95
shellveil.com
digitaldame.shop
gsqjrl.top
freitasfamilylaw.com
alliancetransportllc.com
connecthospitality.work
awwaloon.com
fomohour.xyz
sjapkhuf.top
designmcraft.com
travelguidanceer.pro
vejashoessuomi.com
smallsipsteel.com
hallowedhavenstudios.com
bestonsports.com
touxiong53a.com
azgskyhvz4.top
strategicroulette.com
69farma.com
cosmosoftventures.com
ssongg872.cfd
integralfit.net
ewapalucka.com
openstakeholder.com
ssongg258.cfd
gunacilix.online
snirvacampo.pro
gasengi.live
you-rediscovered.com
nbazxop.xyz
kambingtoto.com
xiurenwang.club
ragattidesign.com
extraplusdigital.com
turbifypro.com
smm79.xyz
glitterplugbeats.com
laurylee.com
cincyqhi.com
cncqj.com
onlinesports.store
zhongtuo63.com
kombicrash.com
rockytopspiritsco.com
tap10.app
danielhen.com
fredasante.com
virginiadish.com
talktoapm.com
urdcs.cfd
89vh.xyz
theascnedancygroup.com
loadedreview.com
forgingbridgesattr.com
182jj.xyz
ycfzw.com
appoficialnovo.shop
cantrillart.com
rrproperty.net
pluribusmarketing.com
nuvanta.net
blamewho.com
hotshift.show
sharesgram.com
csshotelsystems.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral2/memory/3296-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3296-41-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4372-51-0x0000000000F30000-0x0000000000F5F000-memory.dmp formbook behavioral2/memory/4372-57-0x0000000000F30000-0x0000000000F5F000-memory.dmp formbook behavioral2/memory/4372-59-0x0000000000F30000-0x0000000000F5F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation Drawing.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 64 set thread context of 3296 64 Drawing.exe 100 PID 3296 set thread context of 3324 3296 Drawing.exe 53 PID 4372 set thread context of 3324 4372 svchost.exe 53 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4984 powershell.exe 4984 powershell.exe 3296 Drawing.exe 3296 Drawing.exe 3296 Drawing.exe 3296 Drawing.exe 3296 Drawing.exe 3296 Drawing.exe 4984 powershell.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe 4372 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3324 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3296 Drawing.exe 3296 Drawing.exe 3296 Drawing.exe 4372 svchost.exe 4372 svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 3296 Drawing.exe Token: SeDebugPrivilege 4372 svchost.exe Token: SeShutdownPrivilege 3324 Explorer.EXE Token: SeCreatePagefilePrivilege 3324 Explorer.EXE Token: SeShutdownPrivilege 3324 Explorer.EXE Token: SeCreatePagefilePrivilege 3324 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3324 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 64 wrote to memory of 4984 64 Drawing.exe 96 PID 64 wrote to memory of 4984 64 Drawing.exe 96 PID 64 wrote to memory of 4984 64 Drawing.exe 96 PID 64 wrote to memory of 2344 64 Drawing.exe 98 PID 64 wrote to memory of 2344 64 Drawing.exe 98 PID 64 wrote to memory of 2344 64 Drawing.exe 98 PID 64 wrote to memory of 3296 64 Drawing.exe 100 PID 64 wrote to memory of 3296 64 Drawing.exe 100 PID 64 wrote to memory of 3296 64 Drawing.exe 100 PID 64 wrote to memory of 3296 64 Drawing.exe 100 PID 64 wrote to memory of 3296 64 Drawing.exe 100 PID 64 wrote to memory of 3296 64 Drawing.exe 100 PID 3324 wrote to memory of 4372 3324 Explorer.EXE 102 PID 3324 wrote to memory of 4372 3324 Explorer.EXE 102 PID 3324 wrote to memory of 4372 3324 Explorer.EXE 102 PID 4372 wrote to memory of 1768 4372 svchost.exe 104 PID 4372 wrote to memory of 1768 4372 svchost.exe 104 PID 4372 wrote to memory of 1768 4372 svchost.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\Drawing.exe"C:\Users\Admin\AppData\Local\Temp\Drawing.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NKLDrvsKeZqp.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NKLDrvsKeZqp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6B14.tmp"3⤵
- Creates scheduled task(s)
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Drawing.exe"C:\Users\Admin\AppData\Local\Temp\Drawing.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"3⤵PID:1768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD54363a36b101b47ca0d2cc5f94c27e3d2
SHA1e305bbc35b19a7ab5e823a4f74247189b482135d
SHA256a0ab2b19f92bb0e3146b2fa749a65dbd06e113df5c4b92e10df34450ed6d3fb5
SHA512b425ef203fa5e3cb57a8bcfb5b9febfe2b8da220de2c7507453fc3ade67e6a144a7407d9209efb4091e32e1deb52fe4e83398a98228d7dbce26769c2c4189c1b