Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 02:06

General

  • Target

    f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe

  • Size

    1.0MB

  • MD5

    0de4eb1758f5ef209ed50d5728cbb729

  • SHA1

    dc50323b58a5f7a71f9c51c135e09f522aba1d26

  • SHA256

    f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651

  • SHA512

    616bac0fdbf0ae628b8c6fb1cc2608a966703dce4005ea0812b9e7102e7db2e064c2e5512b725a10b052bf0f41d91888b9dcac7d63da22e6d844488dba366286

  • SSDEEP

    24576:FAHnh+eWsN3skA4RV1Hom2KXMmHakjr3rmhkjknnL5:0h+ZkldoPK8YakvqhkjkN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

se63

Decoy

socratesandhisclouds.com

versioncolor.com

ytcp011.com

908511.vip

egysrvs.com

ky5682011.cc

kkuu14.icu

wavebsb.com

klikadelivery.com

jnbxbpq.com

5o8oh.us

hemule.net

techinf.xyz

bevage.club

we37h.com

tipsde.shop

48136.vip

bestcampertrailerbrands.com

fairmedics.in

quixonic.tech

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe
      "C:\Users\Admin\AppData\Local\Temp\f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 316
        3⤵
        • Program crash
        PID:3036
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\svchost.exe"
        3⤵
          PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1160-26-0x0000000006930000-0x0000000006A62000-memory.dmp

      Filesize

      1.2MB

    • memory/1160-17-0x0000000006930000-0x0000000006A62000-memory.dmp

      Filesize

      1.2MB

    • memory/1160-14-0x00000000003D0000-0x00000000004D0000-memory.dmp

      Filesize

      1024KB

    • memory/1160-33-0x0000000006D00000-0x0000000006E20000-memory.dmp

      Filesize

      1.1MB

    • memory/1160-30-0x0000000006D00000-0x0000000006E20000-memory.dmp

      Filesize

      1.1MB

    • memory/1160-29-0x0000000006D00000-0x0000000006E20000-memory.dmp

      Filesize

      1.1MB

    • memory/2128-11-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2128-16-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2128-15-0x0000000000150000-0x0000000000165000-memory.dmp

      Filesize

      84KB

    • memory/2128-12-0x00000000009E0000-0x0000000000CE3000-memory.dmp

      Filesize

      3.0MB

    • memory/2292-10-0x0000000000160000-0x0000000000164000-memory.dmp

      Filesize

      16KB

    • memory/2684-19-0x00000000006A0000-0x00000000006AA000-memory.dmp

      Filesize

      40KB

    • memory/2684-24-0x0000000001ED0000-0x0000000001F64000-memory.dmp

      Filesize

      592KB

    • memory/2684-22-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2684-21-0x0000000002060000-0x0000000002363000-memory.dmp

      Filesize

      3.0MB

    • memory/2684-20-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2684-18-0x00000000006A0000-0x00000000006AA000-memory.dmp

      Filesize

      40KB