Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240704-en
General
-
Target
MalwareBazaar.exe
-
Size
620KB
-
MD5
035c35bf6a68763ba391504a7c6a4993
-
SHA1
2fb903b75098baf7d39fdc3db68cfb35e03100e8
-
SHA256
b731e1e07da1ab601c2773e2124f60e482f30f81bf2d1d64c3363c5d1f4ec08d
-
SHA512
4c6cbdcfed65bdcf1c37f93d02f6cf0ae839a3ac6016b594ff690a1d24615ba9abdeeb651734bb4b237c8cc9045e91c5ac25e1ed30b7762abe62a93a7170f049
-
SSDEEP
12288:j4lz4cX9/R3FcFCstoAsfqYFPV7PGuj9zcU/Nk8emr1y6m7H2ph1hRvjndCrkR:jcz4c7eFCseACJhzcU/Nkarub2fJvjdF
Malware Config
Extracted
formbook
4.1
ss24
agingwellhc.com
unikbetanggur.autos
eb2024yl.top
ja380.xyz
thehalcyon.studio
maudsoogrim.com
esteler10.click
mewtcp.xyz
www-zjbf1.club
kucinglucu.online
lunwencheck.com
65597.photos
erbxeu358h.top
startable.online
yousend.xyz
csharksg.com
centricoatings.com
ntruhslearn.xyz
achabakra.xyz
zuntool.com
jejbtl738a.top
runebinder.com
fidogmesvies170s63.online
online-unicsedritcorp.com
8208975.com
supporthq.life
protocolozeroacne.com
ocotilloco.com
xcolbu456t.xyz
ciclidossi.com
163875.shop
strangebedfellowstheatre.com
unikbetjeruk.homes
jhlktwyq.xyz
realearthpower.com
crucka.xyz
pkvnvtdb.com
profitablecasino.com
uspspsnami.top
thejerkspices.com
sivagiriashram.info
usavisa8loan.xyz
deoconverter.pro
investing-courses-66663.bond
2025tengxun171.lat
bluebirdbodyworkstudio.com
siblingstalk.com
lxcqx.com
amharicprofessional.pro
lijiangstory.net
barflybook.com
eldesigin.com
yd81w.top
head2toe.boutique
varun.works
next-genlion.com
awvd97.com
derindenizotel.com
vertibridge.xyz
qdfake609am.xyz
acc-pay.top
qblackbit.com
pallesudatissime.com
8548d.com
ygyqpswy.xyz
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2612-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2976-22-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2792 powershell.exe -
Deletes itself 1 IoCs
pid Process 1900 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2336 set thread context of 2612 2336 MalwareBazaar.exe 34 PID 2612 set thread context of 1200 2612 MalwareBazaar.exe 21 PID 2976 set thread context of 1200 2976 cscript.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2612 MalwareBazaar.exe 2612 MalwareBazaar.exe 2792 powershell.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe 2976 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2612 MalwareBazaar.exe 2612 MalwareBazaar.exe 2612 MalwareBazaar.exe 2976 cscript.exe 2976 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2612 MalwareBazaar.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 2976 cscript.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2792 2336 MalwareBazaar.exe 30 PID 2336 wrote to memory of 2792 2336 MalwareBazaar.exe 30 PID 2336 wrote to memory of 2792 2336 MalwareBazaar.exe 30 PID 2336 wrote to memory of 2792 2336 MalwareBazaar.exe 30 PID 2336 wrote to memory of 2856 2336 MalwareBazaar.exe 31 PID 2336 wrote to memory of 2856 2336 MalwareBazaar.exe 31 PID 2336 wrote to memory of 2856 2336 MalwareBazaar.exe 31 PID 2336 wrote to memory of 2856 2336 MalwareBazaar.exe 31 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 2336 wrote to memory of 2612 2336 MalwareBazaar.exe 34 PID 1200 wrote to memory of 2976 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2976 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2976 1200 Explorer.EXE 36 PID 1200 wrote to memory of 2976 1200 Explorer.EXE 36 PID 2976 wrote to memory of 1900 2976 cscript.exe 37 PID 2976 wrote to memory of 1900 2976 cscript.exe 37 PID 2976 wrote to memory of 1900 2976 cscript.exe 37 PID 2976 wrote to memory of 1900 2976 cscript.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DUsLon.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DUsLon" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDFD4.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD565df8cb4e2fe2992140ab7a1a220e8b6
SHA1c95584fc7007ef04289001de36e05da61dc7b233
SHA256c78d92963b4500d483a7bdb1d012cadf88089e479cfc1394b48dd7cc2b391482
SHA512ce4bb01d3f9d7824ec159834dc860cb81f5f3900888da66a92611cdef6e475b72614def68232830a8a6435bf18893603170da4d50d4b9e608b99d6c76e745cbe