Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe
Resource
win7-20240221-en
General
-
Target
f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe
-
Size
1.0MB
-
MD5
0de4eb1758f5ef209ed50d5728cbb729
-
SHA1
dc50323b58a5f7a71f9c51c135e09f522aba1d26
-
SHA256
f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651
-
SHA512
616bac0fdbf0ae628b8c6fb1cc2608a966703dce4005ea0812b9e7102e7db2e064c2e5512b725a10b052bf0f41d91888b9dcac7d63da22e6d844488dba366286
-
SSDEEP
24576:FAHnh+eWsN3skA4RV1Hom2KXMmHakjr3rmhkjknnL5:0h+ZkldoPK8YakvqhkjkN
Malware Config
Extracted
formbook
4.1
se63
socratesandhisclouds.com
versioncolor.com
ytcp011.com
908511.vip
egysrvs.com
ky5682011.cc
kkuu14.icu
wavebsb.com
klikadelivery.com
jnbxbpq.com
5o8oh.us
hemule.net
techinf.xyz
bevage.club
we37h.com
tipsde.shop
48136.vip
bestcampertrailerbrands.com
fairmedics.in
quixonic.tech
aldcr.in
drepeacewp.com
odty914.net
live2move.us
galeriaspognardi.com
danauslot.shop
usapubpong.com
jingchen.xyz
xztyvk.xyz
butimarproductions.com
wuhangyjs.com
baddogdigital.com
mb28apparel.com
bnkk9o3zrgsy5.quest
playsolutionsinc.com
warriors4earth.com
gastric-balloon-71533.bond
adptgn.com
psicologiaparausted.com
gothecleaningpros.com
xnc8ki.vip
908511.vip
ozr3np.com
tradingbase.cloud
36h9.com
iaobet.net
6902470365.com
qasolvers.in
00047.vip
massiverole.shop
used-cars-66201.bond
baisexual.com
shoreswimschool.com
shrike.foo
shemosservicesllc.net
electric-cars-97134.bond
aicryptochain.com
wg5688.com
nomades.digital
thesiamesebetta.store
abbymartz.com
kimsnailsii.top
producepatch.shop
ebridgereal.site
cincinnatisoup.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2324-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2324-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3932-20-0x0000000001070000-0x000000000109F000-memory.dmp formbook behavioral2/memory/3932-22-0x0000000001070000-0x000000000109F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3152 set thread context of 2324 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 87 PID 2324 set thread context of 3428 2324 svchost.exe 57 PID 3932 set thread context of 3428 3932 mstsc.exe 57 -
Program crash 1 IoCs
pid pid_target Process procid_target 408 3152 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe 3932 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 3932 mstsc.exe 3932 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2324 svchost.exe Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeDebugPrivilege 3932 mstsc.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 3428 Explorer.EXE 3428 Explorer.EXE 3428 Explorer.EXE -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 3428 Explorer.EXE 3428 Explorer.EXE 3428 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3428 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2324 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 87 PID 3152 wrote to memory of 2324 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 87 PID 3152 wrote to memory of 2324 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 87 PID 3152 wrote to memory of 2324 3152 f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe 87 PID 3428 wrote to memory of 3932 3428 Explorer.EXE 91 PID 3428 wrote to memory of 3932 3428 Explorer.EXE 91 PID 3428 wrote to memory of 3932 3428 Explorer.EXE 91 PID 3932 wrote to memory of 1988 3932 mstsc.exe 92 PID 3932 wrote to memory of 1988 3932 mstsc.exe 92 PID 3932 wrote to memory of 1988 3932 mstsc.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe"C:\Users\Admin\AppData\Local\Temp\f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\f6723f25605e46b8bdd2a8a875ee319c40108491934b2f8fbcdd58d649cbc651.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 7043⤵
- Program crash
PID:408
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵PID:1988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3152 -ip 31521⤵PID:2904