Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 05:52

General

  • Target

    993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe

  • Size

    635KB

  • MD5

    266b256a9d1e3e48d3e7f332d55808bc

  • SHA1

    fb3d7c13dc44c3cb476fd0a0f7fd3b377373e8d3

  • SHA256

    993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e

  • SHA512

    3bea81f5f96eae9abc8a6733c0220367e8664b2b2c15c4c663fa03fbf97663ec5becb2cfc3468c796757bfd33912880bd7900796b2da8f3387f629d2cbd606a3

  • SSDEEP

    12288:vSmPwRYnOELz89OW+pPqwABljLt2EnS3KrNLr8StEotSnFKIFN:vSmP0Y74uPqwABlHtzSaaSLSnsiN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fr07

Decoy

considerateandrefrigerate.com

yuuki.academy

elizabethcaldwellportfolio.com

kegdol.xyz

wecommerce.one

4018mlp.com

nirng8u.online

techmalabar.com

hm885.com

lacademiedespossibles.com

sungnamdobae.com

aldardasha.website

tvkvijay.support

subpreschoolteacher.com

revolutionstealth.com

rtpindo1.store

healingsensationscbd.com

digitalmakeads.cloud

vlascosupplies.com

trautwen.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe
    "C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aSXtUrcyfD.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:216
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aSXtUrcyfD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp73C8.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3360
    • C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe
      "C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"
      2⤵
        PID:4868
      • C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe
        "C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nzw5f032.y3e.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp73C8.tmp

      Filesize

      1KB

      MD5

      18eba60fff54d8a39cb9ad904b89609b

      SHA1

      6ce8e7a03f1a910219eafba16abfc40d28a2a206

      SHA256

      6fc459c97210f49e348ba2ed802b6cf8e0f88fb5a2b155509a29733f8841d103

      SHA512

      7e1704a07013ca2cd5b01d84cdeb5bb7ff04e3e10afaa8c4bdf8ac12db306e0339cdfed73b85aea8a5e908ac84ea00e9f0e8e85e3564bbcc536cb8c5e58c1802

    • memory/216-52-0x0000000006E40000-0x0000000006E5E000-memory.dmp

      Filesize

      120KB

    • memory/216-20-0x0000000005B80000-0x00000000061A8000-memory.dmp

      Filesize

      6.2MB

    • memory/216-65-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/216-62-0x0000000007ED0000-0x0000000007ED8000-memory.dmp

      Filesize

      32KB

    • memory/216-61-0x0000000007EF0000-0x0000000007F0A000-memory.dmp

      Filesize

      104KB

    • memory/216-60-0x0000000007DF0000-0x0000000007E04000-memory.dmp

      Filesize

      80KB

    • memory/216-59-0x0000000007DE0000-0x0000000007DEE000-memory.dmp

      Filesize

      56KB

    • memory/216-58-0x0000000007DB0000-0x0000000007DC1000-memory.dmp

      Filesize

      68KB

    • memory/216-14-0x0000000002F60000-0x0000000002F96000-memory.dmp

      Filesize

      216KB

    • memory/216-57-0x0000000007E30000-0x0000000007EC6000-memory.dmp

      Filesize

      600KB

    • memory/216-16-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/216-17-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/216-18-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/216-56-0x0000000007C20000-0x0000000007C2A000-memory.dmp

      Filesize

      40KB

    • memory/216-55-0x0000000007BB0000-0x0000000007BCA000-memory.dmp

      Filesize

      104KB

    • memory/216-22-0x00000000058E0000-0x0000000005902000-memory.dmp

      Filesize

      136KB

    • memory/216-23-0x0000000005A80000-0x0000000005AE6000-memory.dmp

      Filesize

      408KB

    • memory/216-25-0x00000000061B0000-0x0000000006216000-memory.dmp

      Filesize

      408KB

    • memory/216-54-0x00000000081F0000-0x000000000886A000-memory.dmp

      Filesize

      6.5MB

    • memory/216-53-0x0000000007A60000-0x0000000007B03000-memory.dmp

      Filesize

      652KB

    • memory/216-40-0x0000000007820000-0x0000000007852000-memory.dmp

      Filesize

      200KB

    • memory/216-32-0x0000000006320000-0x0000000006674000-memory.dmp

      Filesize

      3.3MB

    • memory/216-37-0x00000000068A0000-0x00000000068BE000-memory.dmp

      Filesize

      120KB

    • memory/216-38-0x0000000006A00000-0x0000000006A4C000-memory.dmp

      Filesize

      304KB

    • memory/216-39-0x000000007F020000-0x000000007F030000-memory.dmp

      Filesize

      64KB

    • memory/216-51-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/216-41-0x0000000072F40000-0x0000000072F8C000-memory.dmp

      Filesize

      304KB

    • memory/4964-24-0x0000000001570000-0x00000000018BA000-memory.dmp

      Filesize

      3.3MB

    • memory/4964-19-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/5108-5-0x0000000005440000-0x000000000544A000-memory.dmp

      Filesize

      40KB

    • memory/5108-3-0x0000000005390000-0x0000000005422000-memory.dmp

      Filesize

      584KB

    • memory/5108-26-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/5108-9-0x0000000009330000-0x00000000093CC000-memory.dmp

      Filesize

      624KB

    • memory/5108-0-0x0000000000910000-0x00000000009B6000-memory.dmp

      Filesize

      664KB

    • memory/5108-1-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/5108-8-0x0000000006CD0000-0x0000000006D46000-memory.dmp

      Filesize

      472KB

    • memory/5108-7-0x0000000005660000-0x0000000005672000-memory.dmp

      Filesize

      72KB

    • memory/5108-6-0x0000000005620000-0x000000000563C000-memory.dmp

      Filesize

      112KB

    • memory/5108-2-0x0000000005AA0000-0x0000000006044000-memory.dmp

      Filesize

      5.6MB

    • memory/5108-4-0x0000000005670000-0x0000000005680000-memory.dmp

      Filesize

      64KB