Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
General
-
Target
tmp.exe
-
Size
327KB
-
MD5
7ff646fbaa5bb955d1b0cfaffaf61cb2
-
SHA1
91f6d86cc0cb5ef9860752d10315ce65a6b6fb3c
-
SHA256
ecd04804617988e39d5f075e021f6403a33b688ef388f75b897e4c4f7e21e466
-
SHA512
99a6eac16659c579f4a4176861148d3c2c56099eec95f3e1dd4d0ff18e7f87e8db792f3b5c03b16f9d62c5fd16e9f6e37ed79bb4a4bf63d3b286a1aeb5702eb9
-
SSDEEP
6144:vYa6iwngrjoJm3rXSpywnBRwA6QfGO4LiC6aAV4Fii6RhUCpOMLILE6cv3ciy:vY0CgrcM7XSpfBRCQe9ujRRlTOEZ4
Malware Config
Extracted
formbook
4.1
sy22
vinteligencia.com
displayfridges.fun
completetip.com
giallozafferrano.com
jizihao1.com
mysticheightstrail.com
fourseasonslb.com
kjnala.shop
mosiacwall.com
vandistreet.com
gracefullytouchedartistry.com
hbiwhwr.shop
mfmz.net
hrmbrillianz.com
funwarsztat.com
polewithcandy.com
ourrajasthan.com
wilhouettteamerica.com
johnnystintshop.com
asgnelwin.com
alcmcyu.com
thwmlohr.click
gypseascuba.com
mysonisgaythemovie.com
sunriseautostorellc.com
fuhouse.link
motorcycleglassesshop.com
vaskaworldairways.com
qixservice.online
b2b-scaling.com
03ss.vip
trishpintar.com
gk84.com
omclaval.com
emeeycarwash.com
wb7mnp.com
kimgj.com
278809.com
summitstracecolumbus.com
dryadai.com
vistcreative.com
weoliveorder.com
kwamitikki.com
cjk66.online
travisline.pro
mercardosupltda.shop
sunspotplumbing.com
podplugca.com
leontellez.com
fzturf.com
docomo-mobileconsulting.com
apneabirmingham.info
rollesgraciejiujitsu.com
sx15k.com
kebobcapital.com
91967.net
claudiaduverglas.com
zhperviepixie.com
oliwas.xyz
flowersinspace.tech
uadmxqby.click
greatbaitusa.com
drpenawaraircondhargarahmah.com
sofbks.top
sarthaksrishticreation.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2600-7-0x0000000000740000-0x000000000076F000-memory.dmp formbook behavioral2/memory/2600-13-0x0000000000740000-0x000000000076F000-memory.dmp formbook behavioral2/memory/2884-18-0x0000000001220000-0x000000000124F000-memory.dmp formbook behavioral2/memory/2884-20-0x0000000001220000-0x000000000124F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 100 bhkgnm.exe 2600 bhkgnm.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 100 set thread context of 2600 100 bhkgnm.exe 87 PID 2600 set thread context of 3168 2600 bhkgnm.exe 55 PID 2884 set thread context of 3168 2884 wscript.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2600 bhkgnm.exe 2600 bhkgnm.exe 2600 bhkgnm.exe 2600 bhkgnm.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe 2884 wscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3168 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 100 bhkgnm.exe 100 bhkgnm.exe 2600 bhkgnm.exe 2600 bhkgnm.exe 2600 bhkgnm.exe 2884 wscript.exe 2884 wscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2600 bhkgnm.exe Token: SeDebugPrivilege 2884 wscript.exe Token: SeShutdownPrivilege 3168 Explorer.EXE Token: SeCreatePagefilePrivilege 3168 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3168 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4376 wrote to memory of 100 4376 tmp.exe 86 PID 4376 wrote to memory of 100 4376 tmp.exe 86 PID 4376 wrote to memory of 100 4376 tmp.exe 86 PID 100 wrote to memory of 2600 100 bhkgnm.exe 87 PID 100 wrote to memory of 2600 100 bhkgnm.exe 87 PID 100 wrote to memory of 2600 100 bhkgnm.exe 87 PID 100 wrote to memory of 2600 100 bhkgnm.exe 87 PID 3168 wrote to memory of 2884 3168 Explorer.EXE 88 PID 3168 wrote to memory of 2884 3168 Explorer.EXE 88 PID 3168 wrote to memory of 2884 3168 Explorer.EXE 88 PID 2884 wrote to memory of 2812 2884 wscript.exe 95 PID 2884 wrote to memory of 2812 2884 wscript.exe 95 PID 2884 wrote to memory of 2812 2884 wscript.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\bhkgnm.exe"C:\Users\Admin\AppData\Local\Temp\bhkgnm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\bhkgnm.exe"C:\Users\Admin\AppData\Local\Temp\bhkgnm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bhkgnm.exe"3⤵PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5eab8e6995213ca81ec2579ae8454d658
SHA1990ca146cdc55c347f20325f61d0a579c59cd175
SHA256c73c0e3afe2d95420d4ac987143bb32d5e761a22acaafaa1e0dc35b2140efe76
SHA512c1e8e2cfa84724009a6682c464c9075684fedd2cd902c5a537ceb0e82bd8d2dc83a7295f6bc3441d7710d1b29cad176e445d60550c2032055dddf5047e4bda40
-
Filesize
194KB
MD5eab8e6995213ca81ec2579ae8454d658
SHA1990ca146cdc55c347f20325f61d0a579c59cd175
SHA256c73c0e3afe2d95420d4ac987143bb32d5e761a22acaafaa1e0dc35b2140efe76
SHA512c1e8e2cfa84724009a6682c464c9075684fedd2cd902c5a537ceb0e82bd8d2dc83a7295f6bc3441d7710d1b29cad176e445d60550c2032055dddf5047e4bda40
-
Filesize
194KB
MD5eab8e6995213ca81ec2579ae8454d658
SHA1990ca146cdc55c347f20325f61d0a579c59cd175
SHA256c73c0e3afe2d95420d4ac987143bb32d5e761a22acaafaa1e0dc35b2140efe76
SHA512c1e8e2cfa84724009a6682c464c9075684fedd2cd902c5a537ceb0e82bd8d2dc83a7295f6bc3441d7710d1b29cad176e445d60550c2032055dddf5047e4bda40
-
Filesize
205KB
MD5a453cea43f21db1509d89404630b842d
SHA12c97d2e24d9c6464666ddee5063fac4978f0524c
SHA256f729f6645338d7e33cdc873d1c3e4b9b5d8e76c677b29f2a75aa4a865d78c86a
SHA512bcdfe0fd6080e3167fb3d597829b25a9a257280ab620f19160cae76851749ed53aea4ef6211d0d5563fed2ff98a0d3513e9489caedf42aff21aa7b0a4c220a46