Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 07:24

General

  • Target

    Fiyat Teklif_Erymetal A.s_MKLoO8887.exe

  • Size

    970KB

  • MD5

    661c72c6ea35739a807366da34d0052f

  • SHA1

    3eea434063b29bd161c875d4ab22ac9983c7bf6e

  • SHA256

    ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3

  • SHA512

    185cc33cbcb52f3dfa5029631d2fef28fd3133c115fdb9d239ead22822ca8ef5066614a405d1c079e770d55acbe2e9da70c95fb5f4f03bc75a9ebd61c4da7e67

  • SSDEEP

    12288:Hh1Lk70TnvjcXn4GJmWvNgczUjmYYSHIFHpCLE+8MbElL3JWl8CnpOOXA:Tk70TrcX4zWvNPURNIFIEWbqYpO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bz24

Decoy

paltran.com

convadesolutions.com

smyx9b.work

friggerio.com

jndyfjc.com

dm4im2q2.top

adamloweforpresident2020.com

grvtyindustries.com

lovelycacau.com

seqizi.net

xisl88.com

dateknightdelivered.com

celebsmoaic.online

patriciolawnlandscapellc.com

liqq.asia

solutions4educators.com

hybridrate.com

newseza.com

enfejbaz9jdfthea.click

bergstromchevymadison.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\Fiyat Teklif_Erymetal A.s_MKLoO8887.exe
      "C:\Users\Admin\AppData\Local\Temp\Fiyat Teklif_Erymetal A.s_MKLoO8887.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
          PID:1808
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2580
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:2544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogim.jpeg

        Filesize

        56KB

        MD5

        10f00d3276e9283a0aa83b24dd0d085d

        SHA1

        7fb32976be99a853a67218c882e3d7a08ae6179c

        SHA256

        c1e6d7339d1358f31e1573e33b48f17d62b0c4a80a454b8008ce38236f1d5591

        SHA512

        e470ab69b5e127d386941ceb5e8cd0405998e8d55999367706782a882245fcd4c924993c8dce668b9f9ae9f46fd45a07a80c91c0b74897be3728b8e5587bd33b

      • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrf.ini

        Filesize

        40B

        MD5

        2f245469795b865bdd1b956c23d7893d

        SHA1

        6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

        SHA256

        1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

        SHA512

        909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

      • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogri.ini

        Filesize

        40B

        MD5

        d63a82e5d81e02e399090af26db0b9cb

        SHA1

        91d0014c8f54743bba141fd60c9d963f869d76c9

        SHA256

        eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

        SHA512

        38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

      • C:\Users\Admin\AppData\Roaming\9PM15TB1\9PMlogrv.ini

        Filesize

        40B

        MD5

        ba3b6bc807d4f76794c4b81b09bb9ba5

        SHA1

        24cb89501f0212ff3095ecc0aba97dd563718fb1

        SHA256

        6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

        SHA512

        ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

      • memory/1348-25-0x0000000006BF0000-0x0000000006CF3000-memory.dmp

        Filesize

        1.0MB

      • memory/1348-34-0x0000000008FE0000-0x0000000009145000-memory.dmp

        Filesize

        1.4MB

      • memory/1348-30-0x00000000039B0000-0x0000000003BB0000-memory.dmp

        Filesize

        2.0MB

      • memory/1348-31-0x0000000008FE0000-0x0000000009145000-memory.dmp

        Filesize

        1.4MB

      • memory/1348-18-0x0000000006BF0000-0x0000000006CF3000-memory.dmp

        Filesize

        1.0MB

      • memory/1348-17-0x0000000003750000-0x0000000003850000-memory.dmp

        Filesize

        1024KB

      • memory/1348-32-0x0000000008FE0000-0x0000000009145000-memory.dmp

        Filesize

        1.4MB

      • memory/1564-3-0x0000000004910000-0x00000000049C6000-memory.dmp

        Filesize

        728KB

      • memory/1564-5-0x00000000022C0000-0x0000000002300000-memory.dmp

        Filesize

        256KB

      • memory/1564-12-0x00000000746C0000-0x0000000074DAE000-memory.dmp

        Filesize

        6.9MB

      • memory/1564-4-0x0000000000590000-0x000000000059A000-memory.dmp

        Filesize

        40KB

      • memory/1564-0-0x00000000746C0000-0x0000000074DAE000-memory.dmp

        Filesize

        6.9MB

      • memory/1564-2-0x00000000022C0000-0x0000000002300000-memory.dmp

        Filesize

        256KB

      • memory/1564-1-0x00000000049C0000-0x0000000004A76000-memory.dmp

        Filesize

        728KB

      • memory/2580-13-0x00000000008B0000-0x0000000000BB3000-memory.dmp

        Filesize

        3.0MB

      • memory/2580-15-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2580-16-0x0000000000190000-0x00000000001A5000-memory.dmp

        Filesize

        84KB

      • memory/2580-11-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2580-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2580-8-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2580-6-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2712-22-0x00000000006F0000-0x00000000009F3000-memory.dmp

        Filesize

        3.0MB

      • memory/2712-23-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/2712-21-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/2712-29-0x00000000005D0000-0x0000000000664000-memory.dmp

        Filesize

        592KB

      • memory/2712-20-0x0000000000C50000-0x0000000000C58000-memory.dmp

        Filesize

        32KB

      • memory/2712-19-0x0000000000C50000-0x0000000000C58000-memory.dmp

        Filesize

        32KB