Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
038159.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
038159.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jaqxzro.dll
Resource
win7-20240221-en
General
-
Target
$PLUGINSDIR/jaqxzro.dll
-
Size
29KB
-
MD5
1e8aa5fcc0f7de7a0836081dd9efff05
-
SHA1
48317ef5f587f52fd34b42164dfb893dcde95e1b
-
SHA256
5389af7b3d0f5a3496cd2aa538a6ee01fd5a9bd1a8fcf3b9411f4112313d43af
-
SHA512
addd27d8923bf5d3f7d87e3eb2f6138d05532aa7c9340fde2f998a84fa87f227b63cd515176940de099d4f8dc46d1ab7467f4e347e266d0ef128d7337d79ea16
-
SSDEEP
384:IcOhNOWCf3iUgfews69swci/+9YFmtgqQzZQFORdP2NG6zZHZD24mYfVSUB+V6G4:DC9szi/MeqQqgRd2pZMbwjGANT5
Malware Config
Extracted
formbook
4.1
w6ya
auden-audio.com
zombieodyssey.com
hdpthg.com
toddtechnical.com
njsdgz.com
yieldfarm.world
guardsveirfynews.net
atmamandir.info
eskisehirtostcusu.online
arrozz.net
v99king.win
jaxonboxing.com
morganevans.net
syandeg.com
valleyofplants.com
corsosportorico.com
tak.support
blacktgpc.com
herdpetshop.com
iifkvhns.xyz
notredameapartmentsnh.com
sourcefogrge.net
fattails.net
hybridleadershiptheory.com
lyymbeautysalon.com
pnia8889789.com
hagklp.com
unmaskingyourheart.com
xcyweb.com
brokerdeck.com
firstmediainternet.biz.id
charlottelawrencecoaching.com
metyon.xyz
aceshiprecycling.net
site4education.com
lmecgpllc.com
glutenfreebud.com
fxy-9cc6.biz
smoothingcapacitors.com
acrylicblanktoppers.com
onetzrot.com
globalfibreimpact.com
idahod3marchingfestival.com
expediom.com
soupyz.com
baremetal.tools
malagacatalogo.com
fuzitavn.com
tnotchconsulting.com
rocfilings.online
belozza.com
razn.xyz
creatormike.com
mehmetatalay.xyz
nh-netsol23.com
muland.website
baishshop.com
newday-newbeginning.com
evautoscam.com
larasgifts.com
jalilcc.com
spiraentertainment.com
mirasms.online
clippingup.com
truth-capturemachine.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral3/memory/2868-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2868-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/2572-15-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral3/memory/2572-17-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2996 set thread context of 2868 2996 rundll32.exe 29 PID 2868 set thread context of 1208 2868 rundll32.exe 21 PID 2572 set thread context of 1208 2572 cmstp.exe 21 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2868 rundll32.exe 2868 rundll32.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe 2572 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2868 rundll32.exe 2868 rundll32.exe 2868 rundll32.exe 2572 cmstp.exe 2572 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 rundll32.exe Token: SeDebugPrivilege 2572 cmstp.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2940 wrote to memory of 2996 2940 rundll32.exe 28 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 2996 wrote to memory of 2868 2996 rundll32.exe 29 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 1208 wrote to memory of 2572 1208 Explorer.EXE 31 PID 2572 wrote to memory of 2788 2572 cmstp.exe 32 PID 2572 wrote to memory of 2788 2572 cmstp.exe 32 PID 2572 wrote to memory of 2788 2572 cmstp.exe 32 PID 2572 wrote to memory of 2788 2572 cmstp.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jaqxzro.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jaqxzro.dll,#13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jaqxzro.dll,#14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1288
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵PID:2788
-
-