Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
new order C00382023.exe
Resource
win7-20231023-en
General
-
Target
new order C00382023.exe
-
Size
829KB
-
MD5
4c53bd8b0d0258ec46214b60aa9ffe44
-
SHA1
f92ad8131bc8772efb25dec5c6536fc7f1b887b2
-
SHA256
2b22ea34acf3633912daa0e5d5c5e3cd3b01bac899f1fd7349383f6922aa4284
-
SHA512
20fdf8f2111b319303302c955e682bc223ca671ed8b366ea2cfd649e39694dd598be6fc294e5755389313430c49119527d38d5682b2579cc6a04d09961fd4b2e
-
SSDEEP
12288:YOpYEuPUpE4U1JyqAj1kEJEB6+5BInzQ23sOpGAIwQONQd6:YsYXUpE4UOy8O6+5BIM2cOwYQa
Malware Config
Extracted
formbook
4.1
ot8s
snrnnc.top
meta-stocktraders.com
btsmo.xyz
slotsgoldenflare.com
ljkghjf.com
kichi.space
3645115.xyz
mostbet-wav8.xyz
chatgrouplinks.com
kingdombusinessfunnels.com
6887088.win
csdgjf.com
33lode88.vip
nwholdinggroups.com
panwhorasbox.com
muriot.com
simafilm.com
xcj005.top
495372.com
zheki444pay.com
cottingatecare.com
leleband.com
kubbo.club
renylulu808.com
researchedevetement.com
junkin.xyz
21baobao.com
irinaboeva.online
nice-to-print.com
airkemasanmurah.site
sunshineadjustingservices.com
96782.xn--fjq720a
warzecharanchservices.com
bestonlinecasinos1.com
thmdst.com
headvantor.com
peakplume.com
zojzoamnp3.com
baba-behtarina-top-1.buzz
arsan.biz
imark-net.com
oneprojetobeauty.com
karamsmm.com
converseit.shop
buste.site
fanzto.cfd
f48fa.top
strategictaxretention.com
francocamacho.com
qjxsb1.top
dtdhglobal.com
modnplay.com
re-el.click
azhkthg1.com
taopuyou.com
tuliphoki88.site
luhkerrion.com
astheygrowlv.com
salesdiypuzzles.com
thestreetpicks.com
makusways.shop
kkxxggxx.top
afcanamotors.com
ottertaildispensary.com
cmbw.club
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4640-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4640-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3796-20-0x0000000000960000-0x000000000098F000-memory.dmp formbook behavioral2/memory/3796-22-0x0000000000960000-0x000000000098F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2372 set thread context of 4640 2372 new order C00382023.exe 95 PID 4640 set thread context of 3112 4640 new order C00382023.exe 47 PID 3796 set thread context of 3112 3796 systray.exe 47 -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 2372 new order C00382023.exe 2372 new order C00382023.exe 4640 new order C00382023.exe 4640 new order C00382023.exe 4640 new order C00382023.exe 4640 new order C00382023.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe 3796 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3112 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4640 new order C00382023.exe 4640 new order C00382023.exe 4640 new order C00382023.exe 3796 systray.exe 3796 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2372 new order C00382023.exe Token: SeDebugPrivilege 4640 new order C00382023.exe Token: SeDebugPrivilege 3796 systray.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3112 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1952 2372 new order C00382023.exe 94 PID 2372 wrote to memory of 1952 2372 new order C00382023.exe 94 PID 2372 wrote to memory of 1952 2372 new order C00382023.exe 94 PID 2372 wrote to memory of 4640 2372 new order C00382023.exe 95 PID 2372 wrote to memory of 4640 2372 new order C00382023.exe 95 PID 2372 wrote to memory of 4640 2372 new order C00382023.exe 95 PID 2372 wrote to memory of 4640 2372 new order C00382023.exe 95 PID 2372 wrote to memory of 4640 2372 new order C00382023.exe 95 PID 2372 wrote to memory of 4640 2372 new order C00382023.exe 95 PID 3112 wrote to memory of 3796 3112 Explorer.EXE 96 PID 3112 wrote to memory of 3796 3112 Explorer.EXE 96 PID 3112 wrote to memory of 3796 3112 Explorer.EXE 96 PID 3796 wrote to memory of 1004 3796 systray.exe 97 PID 3796 wrote to memory of 1004 3796 systray.exe 97 PID 3796 wrote to memory of 1004 3796 systray.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"3⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\new order C00382023.exe"3⤵PID:1004
-
-