Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe
Resource
win7-20231215-en
General
-
Target
993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe
-
Size
635KB
-
MD5
266b256a9d1e3e48d3e7f332d55808bc
-
SHA1
fb3d7c13dc44c3cb476fd0a0f7fd3b377373e8d3
-
SHA256
993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e
-
SHA512
3bea81f5f96eae9abc8a6733c0220367e8664b2b2c15c4c663fa03fbf97663ec5becb2cfc3468c796757bfd33912880bd7900796b2da8f3387f629d2cbd606a3
-
SSDEEP
12288:vSmPwRYnOELz89OW+pPqwABljLt2EnS3KrNLr8StEotSnFKIFN:vSmP0Y74uPqwABlHtzSaaSLSnsiN
Malware Config
Extracted
formbook
4.1
fr07
considerateandrefrigerate.com
yuuki.academy
elizabethcaldwellportfolio.com
kegdol.xyz
wecommerce.one
4018mlp.com
nirng8u.online
techmalabar.com
hm885.com
lacademiedespossibles.com
sungnamdobae.com
aldardasha.website
tvkvijay.support
subpreschoolteacher.com
revolutionstealth.com
rtpindo1.store
healingsensationscbd.com
digitalmakeads.cloud
vlascosupplies.com
trautwen.com
donnasdogshop.com
kbflc.com
quelrecommends.com
le5o59.cyou
manang.site
vcrpg.baby
sosimpledesignstudio.com
disruptfirst.com
vibecartt.com
gsbrdykj.com
grandroyal188-oke.online
cmfitness1.com
novlt.co
absoluteshuttermaintenance.com
suipm.io
paisasporno.com
nadiadentzer.com
freshairs.in
sachinkumawat.in
terrasantainvestments.com
learnproductionsound.com
marvelaftermarket.com
po2greencoffee.com
tarotcovenexperience.com
queenmillion.shop
lt-nuobaudos.net
dareremodeling.com
semu365.com
localisp.net
armorofgodprotection.com
gibit-offers.com
laspaletas.com
fixhobomay.com
airobotmower.com
atlantajubensha.com
apagog.com
chazong.net
big-decks.com
lilh.site
careers-envistaco.com
dokiibi.shop
ketoalarukiworks.buzz
marjeezesoulfulcreations.com
pay-id812746.online
mfqnb.site
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4964-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5108 set thread context of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 4964 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 4964 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 216 powershell.exe 216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe Token: SeDebugPrivilege 216 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5108 wrote to memory of 216 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 89 PID 5108 wrote to memory of 216 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 89 PID 5108 wrote to memory of 216 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 89 PID 5108 wrote to memory of 3360 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 91 PID 5108 wrote to memory of 3360 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 91 PID 5108 wrote to memory of 3360 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 91 PID 5108 wrote to memory of 4868 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 93 PID 5108 wrote to memory of 4868 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 93 PID 5108 wrote to memory of 4868 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 93 PID 5108 wrote to memory of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94 PID 5108 wrote to memory of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94 PID 5108 wrote to memory of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94 PID 5108 wrote to memory of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94 PID 5108 wrote to memory of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94 PID 5108 wrote to memory of 4964 5108 993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aSXtUrcyfD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aSXtUrcyfD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp73C8.tmp"2⤵
- Creates scheduled task(s)
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"2⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"C:\Users\Admin\AppData\Local\Temp\993841103742d791f4dbcdc75757bac6ac7fddf1eb50dcec5a72daddce44cc9e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD518eba60fff54d8a39cb9ad904b89609b
SHA16ce8e7a03f1a910219eafba16abfc40d28a2a206
SHA2566fc459c97210f49e348ba2ed802b6cf8e0f88fb5a2b155509a29733f8841d103
SHA5127e1704a07013ca2cd5b01d84cdeb5bb7ff04e3e10afaa8c4bdf8ac12db306e0339cdfed73b85aea8a5e908ac84ea00e9f0e8e85e3564bbcc536cb8c5e58c1802