Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
21/11/2023, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
new order C00382023.exe
Resource
win7-20231023-en
General
-
Target
new order C00382023.exe
-
Size
829KB
-
MD5
4c53bd8b0d0258ec46214b60aa9ffe44
-
SHA1
f92ad8131bc8772efb25dec5c6536fc7f1b887b2
-
SHA256
2b22ea34acf3633912daa0e5d5c5e3cd3b01bac899f1fd7349383f6922aa4284
-
SHA512
20fdf8f2111b319303302c955e682bc223ca671ed8b366ea2cfd649e39694dd598be6fc294e5755389313430c49119527d38d5682b2579cc6a04d09961fd4b2e
-
SSDEEP
12288:YOpYEuPUpE4U1JyqAj1kEJEB6+5BInzQ23sOpGAIwQONQd6:YsYXUpE4UOy8O6+5BIM2cOwYQa
Malware Config
Extracted
formbook
4.1
ot8s
snrnnc.top
meta-stocktraders.com
btsmo.xyz
slotsgoldenflare.com
ljkghjf.com
kichi.space
3645115.xyz
mostbet-wav8.xyz
chatgrouplinks.com
kingdombusinessfunnels.com
6887088.win
csdgjf.com
33lode88.vip
nwholdinggroups.com
panwhorasbox.com
muriot.com
simafilm.com
xcj005.top
495372.com
zheki444pay.com
cottingatecare.com
leleband.com
kubbo.club
renylulu808.com
researchedevetement.com
junkin.xyz
21baobao.com
irinaboeva.online
nice-to-print.com
airkemasanmurah.site
sunshineadjustingservices.com
96782.xn--fjq720a
warzecharanchservices.com
bestonlinecasinos1.com
thmdst.com
headvantor.com
peakplume.com
zojzoamnp3.com
baba-behtarina-top-1.buzz
arsan.biz
imark-net.com
oneprojetobeauty.com
karamsmm.com
converseit.shop
buste.site
fanzto.cfd
f48fa.top
strategictaxretention.com
francocamacho.com
qjxsb1.top
dtdhglobal.com
modnplay.com
re-el.click
azhkthg1.com
taopuyou.com
tuliphoki88.site
luhkerrion.com
astheygrowlv.com
salesdiypuzzles.com
thestreetpicks.com
makusways.shop
kkxxggxx.top
afcanamotors.com
ottertaildispensary.com
cmbw.club
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1184-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1184-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2652-19-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/2652-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1828 set thread context of 1184 1828 new order C00382023.exe 28 PID 1184 set thread context of 1192 1184 new order C00382023.exe 21 PID 2652 set thread context of 1192 2652 control.exe 21 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1184 new order C00382023.exe 1184 new order C00382023.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe 2652 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1192 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1184 new order C00382023.exe 1184 new order C00382023.exe 1184 new order C00382023.exe 2652 control.exe 2652 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1184 new order C00382023.exe Token: SeDebugPrivilege 2652 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1828 wrote to memory of 1184 1828 new order C00382023.exe 28 PID 1192 wrote to memory of 2652 1192 Explorer.EXE 29 PID 1192 wrote to memory of 2652 1192 Explorer.EXE 29 PID 1192 wrote to memory of 2652 1192 Explorer.EXE 29 PID 1192 wrote to memory of 2652 1192 Explorer.EXE 29 PID 2652 wrote to memory of 2764 2652 control.exe 30 PID 2652 wrote to memory of 2764 2652 control.exe 30 PID 2652 wrote to memory of 2764 2652 control.exe 30 PID 2652 wrote to memory of 2764 2652 control.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"3⤵
- Deletes itself
PID:2764
-
-