Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
Fiyat Teklif_Erymetal A.s_MKLoO8887.exe
Resource
win7-20230831-en
General
-
Target
Fiyat Teklif_Erymetal A.s_MKLoO8887.exe
-
Size
970KB
-
MD5
661c72c6ea35739a807366da34d0052f
-
SHA1
3eea434063b29bd161c875d4ab22ac9983c7bf6e
-
SHA256
ed39cdb38f54700c6cf37768cabd78367a0de953ab1e64b1fd8e9b640e91d8f3
-
SHA512
185cc33cbcb52f3dfa5029631d2fef28fd3133c115fdb9d239ead22822ca8ef5066614a405d1c079e770d55acbe2e9da70c95fb5f4f03bc75a9ebd61c4da7e67
-
SSDEEP
12288:Hh1Lk70TnvjcXn4GJmWvNgczUjmYYSHIFHpCLE+8MbElL3JWl8CnpOOXA:Tk70TrcX4zWvNPURNIFIEWbqYpO
Malware Config
Extracted
formbook
4.1
bz24
paltran.com
convadesolutions.com
smyx9b.work
friggerio.com
jndyfjc.com
dm4im2q2.top
adamloweforpresident2020.com
grvtyindustries.com
lovelycacau.com
seqizi.net
xisl88.com
dateknightdelivered.com
celebsmoaic.online
patriciolawnlandscapellc.com
liqq.asia
solutions4educators.com
hybridrate.com
newseza.com
enfejbaz9jdfthea.click
bergstromchevymadison.com
becozify.com
3a8882.com
norhenkan.net
leslie-jiang.top
bdgz.asia
lsdrw.com
stratusslides.com
jawatankosong.link
by6232.com
shenzhenjubo.com
mgt-xj-313.com
renovaro-ai.com
dvisionaryconnections.com
yyyyyt.com
oohyi.com
misslemonhotcheetoz.info
72nai.xyz
dde.ovh
genai-pubsec.com
huifeiya.com
ordermetrics.dev
ixcdex.top
mac-update.net
15659.top
aqyx.net
dtcp9900.com
syxomz.xyz
bluecarcovers.com
rottenegg.dev
zyk66.com
wiserstride.com
softwareology.online
ex-fudousan.com
spaceyplay.space
aa-012.top
m2senterprises.com
tokenbocket.pro
imtmatcher.shop
cove.directory
wilddolphinswhales.com
wooahanfamily.com
pergolassales.com
kustch.space
472persimmon7.com
aaacaw.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2580-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2580-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2712-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2712-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1564 set thread context of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 2580 set thread context of 1348 2580 aspnet_compiler.exe 12 PID 2712 set thread context of 1348 2712 svchost.exe 12 -
description ioc Process Key created \Registry\User\S-1-5-21-607259312-1573743425-2763420908-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 svchost.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 2580 aspnet_compiler.exe 2580 aspnet_compiler.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1348 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2580 aspnet_compiler.exe 2580 aspnet_compiler.exe 2580 aspnet_compiler.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe Token: SeDebugPrivilege 2580 aspnet_compiler.exe Token: SeDebugPrivilege 2712 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1808 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 28 PID 1564 wrote to memory of 1808 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 28 PID 1564 wrote to memory of 1808 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 28 PID 1564 wrote to memory of 1808 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 28 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1564 wrote to memory of 2580 1564 Fiyat Teklif_Erymetal A.s_MKLoO8887.exe 29 PID 1348 wrote to memory of 2712 1348 Explorer.EXE 30 PID 1348 wrote to memory of 2712 1348 Explorer.EXE 30 PID 1348 wrote to memory of 2712 1348 Explorer.EXE 30 PID 1348 wrote to memory of 2712 1348 Explorer.EXE 30 PID 2712 wrote to memory of 2544 2712 svchost.exe 32 PID 2712 wrote to memory of 2544 2712 svchost.exe 32 PID 2712 wrote to memory of 2544 2712 svchost.exe 32 PID 2712 wrote to memory of 2544 2712 svchost.exe 32 PID 2712 wrote to memory of 2544 2712 svchost.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Fiyat Teklif_Erymetal A.s_MKLoO8887.exe"C:\Users\Admin\AppData\Local\Temp\Fiyat Teklif_Erymetal A.s_MKLoO8887.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:1808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD510f00d3276e9283a0aa83b24dd0d085d
SHA17fb32976be99a853a67218c882e3d7a08ae6179c
SHA256c1e6d7339d1358f31e1573e33b48f17d62b0c4a80a454b8008ce38236f1d5591
SHA512e470ab69b5e127d386941ceb5e8cd0405998e8d55999367706782a882245fcd4c924993c8dce668b9f9ae9f46fd45a07a80c91c0b74897be3728b8e5587bd33b
-
Filesize
40B
MD52f245469795b865bdd1b956c23d7893d
SHA16ad80b974d3808f5a20ea1e766c7d2f88b9e5895
SHA2561662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361
SHA512909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f
-
Filesize
40B
MD5d63a82e5d81e02e399090af26db0b9cb
SHA191d0014c8f54743bba141fd60c9d963f869d76c9
SHA256eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae
SHA51238afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad
-
Filesize
40B
MD5ba3b6bc807d4f76794c4b81b09bb9ba5
SHA124cb89501f0212ff3095ecc0aba97dd563718fb1
SHA2566eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507
SHA512ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf