Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2023, 02:33
Static task
static1
General
-
Target
024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe
-
Size
550KB
-
MD5
6981fc2102b4a2e0f959b202df182f8a
-
SHA1
9d4ec84685c8fe4fdceaff7aaedd69aafef9b3ad
-
SHA256
024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5
-
SHA512
af9ce535fb69b0dfe96c5872e8a8191b964ffe9693334ea4943638daadd2984b98bb8f34040de97f0dc99cb7709b9327ef06024b98e8620c1397cbe6fb0c11ec
-
SSDEEP
12288:hIkqVKSUD29C8S0EoQiJDPDTcqAvMZrjZqJ+OG24MifHit6xn3o:hIkqVQR68iJDP8qHrjX+Nk
Malware Config
Extracted
formbook
4.1
o6g2
sdsteelfurnitures.com
rentpropertypalma.com
qysdh1.xyz
cybersecintl.com
gtvcodes.com
furniture-99972.bond
thirteen39designs.com
ibrahimmallouhi.info
gddenggao.icu
padmabsingh.online
familyfarmequipment.com
tailboost.xyz
euel6.xyz
visualduuck.com
paraserviryproteger.homes
fleurandviola.com
hstgaga.com
whacknet.com
rumenaraya.com
fineeastuk.com
oojlsq.top
863bets.com
prepsnation.com
eaaeedrt.com
erdeya.cfd
sandbarcitymedia.com
0999j.com
whatisalinkcode.com
japanesesalads.com
comedyarte.com
joannamulderlcpc.online
maquinazero.store
blackjackmedia.online
banditqueenpress.com
loripeyton.online
single-moms.net
litehousegroup.com
abiturient.biz
maurice-paetzold.com
songsong.space
californiafunclub.studio
ckled.net
abordagemindividual.com
lctile.net
minchengty.net
pew0y2.cfd
suffergoodbye.net
70dj.fun
hxqvbwrg.asia
limiteofertas.online
buysnowowl.com
setayeshdesign.com
shopscada.com
fuyiyanglao.net
alkemymedia.com
fastfoodsamerica.com
bidbinge.info
mouseroyale.com
hydrauliczny.online
hillstonetrade.com
fz0bxr.com
waa.lat
nhouseo.com
decalsdeluxesc.com
educationacielouvert.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/828-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3128 set thread context of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 828 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 828 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3128 wrote to memory of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71 PID 3128 wrote to memory of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71 PID 3128 wrote to memory of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71 PID 3128 wrote to memory of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71 PID 3128 wrote to memory of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71 PID 3128 wrote to memory of 828 3128 024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe"C:\Users\Admin\AppData\Local\Temp\024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe"C:\Users\Admin\AppData\Local\Temp\024aa4a117fa7c5952577b1e904510e09c0e048a7bfaf320fcbdb4f309c41ba5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-