Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe
Resource
win7-20240705-en
General
-
Target
93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe
-
Size
680KB
-
MD5
207011f0f9e2d8c3ef2d256aa44286b7
-
SHA1
32239c8cdcbc135cadbccfa0ca93312e6a9a8e71
-
SHA256
93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f
-
SHA512
7083c82523316980514e9b615e349b3018605f2e02388fb259607248f0f40fa506e279e38fa7d6b8d8249c49f6cc5d9006b2d78b504512ad9ef8106493bb987c
-
SSDEEP
12288:1Vwp0xC0kU60d7djPR7SCVlxVaPi0xAbY/uVHCJ+yTZ:vwpECfedjPR7SElxVii4AbY/ulMT
Malware Config
Extracted
formbook
4.1
45er
depotpulsa.com
k2bilbao.online
bb4uoficial.com
rwc666.club
us-pservice.cyou
tricegottreats.com
zsystems.pro
qudouyin6.com
sfumaturedamore.net
pcetyy.icu
notbokin.online
beqprod.tech
flipbuilding.com
errormitigationzoo.com
zj5u603.xyz
jezzatravel.com
zmdniavysyi.shop
quinnsteele.com
522334.com
outdoorshopping.net
7140k.vip
appmonster.live
rvrentalsusane.com
berry-hut.com
h-m-32.com
aklnk.xyz
project.fail
thelbacollection.com
ternkm.com
331022.xyz
qhr86.com
casvivip.com
f661dsa-dsf564a.biz
holisticfox.com
taobaoo03.com
kursy-parikmaher.store
reignscents.com
wot4x4.com
axoloterosa.com
instzn.site
nn477.xyz
jwsalestx.com
cualuoinuhoang.com
sagehrsuiteindercloud.solutions
2ecxab.vip
lottery99nft.xyz
budakbetingbet43.click
plaay.live
drmediapulsehub.com
bahismax.com
clareleeuwinclark.com
clarimix.com
ssongg11913.cfd
shapoorji-kingstown.com
detoxifysupplements.info
easy100ksidegig.com
abramovatata.online
barillonfo.net
keendeed.com
yunosave.online
pptv05.xyz
malianbeini.net
polariscicuit.com
sahibindencomparamguvend.link
used-cars-99583.bond
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4032-45-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4960 powershell.exe 4520 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4748 set thread context of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4960 powershell.exe 4520 powershell.exe 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4032 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4032 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 4960 powershell.exe 4520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe Token: SeDebugPrivilege 4960 powershell.exe Token: SeDebugPrivilege 4520 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4960 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 86 PID 4748 wrote to memory of 4960 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 86 PID 4748 wrote to memory of 4960 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 86 PID 4748 wrote to memory of 4520 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 88 PID 4748 wrote to memory of 4520 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 88 PID 4748 wrote to memory of 4520 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 88 PID 4748 wrote to memory of 3308 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 90 PID 4748 wrote to memory of 3308 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 90 PID 4748 wrote to memory of 3308 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 90 PID 4748 wrote to memory of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92 PID 4748 wrote to memory of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92 PID 4748 wrote to memory of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92 PID 4748 wrote to memory of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92 PID 4748 wrote to memory of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92 PID 4748 wrote to memory of 4032 4748 93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe"C:\Users\Admin\AppData\Local\Temp\93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IApYBnDkWBwiDU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IApYBnDkWBwiDU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDBD9.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe"C:\Users\Admin\AppData\Local\Temp\93aeb18c52bece32042f39cbce6994036ac8556043fdc335bb3fc1453ce8d74f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5f82653a2dbbcd5e1d1310ff27d5023e9
SHA1720f4fccbb04f4d1073b17b63659dd2f0aaf4c1c
SHA2568f62786205f1aeb03b85f1b9e7c84816f58a8c72b9c59901b1ad85074ed1e73d
SHA51287e6d1377be7e544500aa2c219265306ce7eeb73b822686c94124a039889a70af2898104b4897e5dfac3e5daefd0992681e8511fd2f006048c8fec3ee6cef266
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5a6be2c928cfbfe4646275e5224459fd1
SHA1705d0520c1060a88af008d654826a99ace1a05ad
SHA256b9e260243a9f1bfb636bdeb9525e38bcbc051c8549fd1af5bcd96af56dad8f6b
SHA51265b572bdbc751ed4c2955365041beeef288594a57f359e1f7fabc2e575ece21a5827a1dc8703c28145a03e256599629edda0c8271f04f422053e1b55824acaf9