Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:30

General

  • Target

    05a5c81fdc977faa60cdd7914e543316.exe

  • Size

    660KB

  • MD5

    05a5c81fdc977faa60cdd7914e543316

  • SHA1

    a6dab7def82d613ac9657f97feae55c1c87d8c8e

  • SHA256

    cba13febcc8a22b7d10f84d29e4b9c596796f4fb158c4ad9318deb5c822af13e

  • SHA512

    6d1e4de25d1f4c86fc394f06cdb9b5773a3f8bfbf32c532e647833a5e5808df701c717ab2cd2e14123966f52ed097abac45f8e36975bde4449d79a33fc4d79b8

  • SSDEEP

    12288:1Dp+gczyhNSvRbBQHR4qz91hI0zSaNsvz+yuWDVId21NaI+E8tyvXddM+5vRmZQc:edX5p/qA6BBVTu6Np8z1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dsnr

Decoy

nilbahis9.com

sport-streamhd.com

lewislegacyinvestments.com

tradingimpulse.com

robincharity.com

20200856meanathing.space

xzklzl.com

raenina.com

ohmygreet.com

xw-bj.com

redevelopment38subhashnagar.com

whadsrm.icu

asiandiasporas.com

legaleum.com

rebelmum.com

kulovic.com

odfjelloceanwind.com

heritageassisted.care

dexterragroup.net

twelvefortyfive.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a5c81fdc977faa60cdd7914e543316.exe
    "C:\Users\Admin\AppData\Local\Temp\05a5c81fdc977faa60cdd7914e543316.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\05a5c81fdc977faa60cdd7914e543316.exe
      "{path}"
      2⤵
        PID:2680
      • C:\Users\Admin\AppData\Local\Temp\05a5c81fdc977faa60cdd7914e543316.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1140

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1140-9-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1140-15-0x0000000000AF0000-0x0000000000DF3000-memory.dmp

      Filesize

      3.0MB

    • memory/1140-8-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1140-14-0x0000000000AF0000-0x0000000000DF3000-memory.dmp

      Filesize

      3.0MB

    • memory/1140-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1140-12-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2388-6-0x0000000005410000-0x00000000054B0000-memory.dmp

      Filesize

      640KB

    • memory/2388-7-0x00000000007E0000-0x0000000000830000-memory.dmp

      Filesize

      320KB

    • memory/2388-0-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2388-13-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2388-5-0x0000000004E70000-0x0000000004EB0000-memory.dmp

      Filesize

      256KB

    • memory/2388-4-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2388-3-0x00000000001E0000-0x00000000001E8000-memory.dmp

      Filesize

      32KB

    • memory/2388-2-0x0000000004E70000-0x0000000004EB0000-memory.dmp

      Filesize

      256KB

    • memory/2388-1-0x0000000000A40000-0x0000000000AEA000-memory.dmp

      Filesize

      680KB