Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT_xlxs.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT_xlxs.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
General
-
Target
STATEMENT OF ACCOUNT_xlxs.exe
-
Size
888KB
-
MD5
2a63c7d093ec7a63a4fabf61452e2206
-
SHA1
501c0f22803da5b0ce77f915efac3567644c47ca
-
SHA256
a51862c42a347c96969bb5e511b81d1beb31d50f850acf4fbf041087911c92f0
-
SHA512
2bbfda19a986bec80b79beb33412fec220ab864ef15d3897a6e3e023e214a0fa7e0c4376d241476911ac5813571db1c07aa65aa8c00d62aaabdd668c5fe25a0f
-
SSDEEP
12288:lRrzL0BkOhDPswBw4nP/CBx21t+TZY44s2WvbcWqOOav/qjqPaK:lJzpOLi4m0fCZsNWpOaHqDK
Malware Config
Extracted
formbook
4.1
oa21
towinglyons.top
dunia-togel.xyz
alabnm.com
1stsole.com
uio3222d.store
little9.site
educationexperienced.com
tjautoline.com
twinzcreationzllc.com
sinsegoldenwolf.com
seeks6.studio
monetatowing.top
hqgroupiq.com
e8f4.com
mayasaccessoriesofficial.com
cribllc.us
homeremodelee.today
etl8ryc.site
danielbrennerreality.com
telcotechmelboure.store
q0ld.site
ansiedadepsicologia.online
00852kjh.com
kristacare.online
cookfranschhoek.com
superstarweed.com
theheatwavepack.com
cte106.vip
tarotpersonalities.com
jteungyt.com
t138.site
der-schoepfer.com
abbasabedini.com
mysticslight.com
mo61753.com
huberprivatecapital.com
lybhsh.com
sexymize.com
kwkstarter.com
pisck6u.sbs
getsilkywaytoday.com
sunglassesclipcheap.com
atxstem.com
yyll0.site
116zy.com
seyret5.top
kodamin.com
lexiop.online
yourecreation.com
mil58.vip
xmpp42.site
leningrad-spb.com
ratu123.ltd
6rpr.site
cntm077.xyz
e1fbar.com
mauroviviani.info
ubmk123.xyz
desouzaproductions.com
immaculatedwellings.com
cottonfruits.com
kennedy-towing.top
cherryridgele.com
glittergrid.com
tswwmvdo.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/448-613-0x0000000000400000-0x0000000001654000-memory.dmp formbook behavioral2/memory/448-616-0x0000000000400000-0x0000000001654000-memory.dmp formbook behavioral2/memory/4556-622-0x00000000005F0000-0x000000000061F000-memory.dmp formbook behavioral2/memory/4556-624-0x00000000005F0000-0x000000000061F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 4068 STATEMENT OF ACCOUNT_xlxs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key = "C:\\Users\\Admin\\subfolder1\\Hirsling.exe" STATEMENT OF ACCOUNT_xlxs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 448 STATEMENT OF ACCOUNT_xlxs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4068 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4068 set thread context of 448 4068 STATEMENT OF ACCOUNT_xlxs.exe 95 PID 448 set thread context of 3548 448 STATEMENT OF ACCOUNT_xlxs.exe 40 PID 4556 set thread context of 3548 4556 wscript.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 448 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe 4556 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4068 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe 448 STATEMENT OF ACCOUNT_xlxs.exe 4556 wscript.exe 4556 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 448 STATEMENT OF ACCOUNT_xlxs.exe Token: SeDebugPrivilege 4556 wscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3548 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4068 wrote to memory of 448 4068 STATEMENT OF ACCOUNT_xlxs.exe 95 PID 4068 wrote to memory of 448 4068 STATEMENT OF ACCOUNT_xlxs.exe 95 PID 4068 wrote to memory of 448 4068 STATEMENT OF ACCOUNT_xlxs.exe 95 PID 4068 wrote to memory of 448 4068 STATEMENT OF ACCOUNT_xlxs.exe 95 PID 4068 wrote to memory of 448 4068 STATEMENT OF ACCOUNT_xlxs.exe 95 PID 3548 wrote to memory of 4556 3548 Explorer.EXE 98 PID 3548 wrote to memory of 4556 3548 Explorer.EXE 98 PID 3548 wrote to memory of 4556 3548 Explorer.EXE 98 PID 4556 wrote to memory of 4364 4556 wscript.exe 100 PID 4556 wrote to memory of 4364 4556 wscript.exe 100 PID 4556 wrote to memory of 4364 4556 wscript.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"3⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT_xlxs.exe"3⤵PID:4364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD5eb4da25d6c0d919bbe9ebc480cee0d05
SHA1dfaeae9c23e9b282a82b1abb971599a5bcd51b27
SHA25670a4ee88b132159f110d96ad83001187c6a272f52d5c766f563b50ac1e072fe3
SHA5121e9972196d4bdbbc7366c1fc980014b3048d036f56afdeb39303263cc7af24217490dd9b9ca85ac11a0bf83a1c31eead3320e158e8b9ac819468023d1548cb5c
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9