Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3A FINAL DR...54.exe
windows7-x64
10A FINAL DR...54.exe
windows10-2004-x64
10A FINAL DR...-0.dll
windows10-2004-x64
1A FINAL DR...-0.dll
windows10-2004-x64
1A FINAL DR...-0.dll
windows10-2004-x64
1A FINAL DR...li.dll
windows7-x64
1A FINAL DR...li.dll
windows10-2004-x64
1A FINAL DR...re.dll
windows7-x64
1A FINAL DR...re.dll
windows10-2004-x64
1A FINAL DR...40.dll
windows7-x64
1A FINAL DR...40.dll
windows10-2004-x64
1A FINAL DR..._1.dll
windows7-x64
1A FINAL DR..._1.dll
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
A FINAL DRAFT BL 00595854/A FINAL DRAFT BL 00595854.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
A FINAL DRAFT BL 00595854/A FINAL DRAFT BL 00595854.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
A FINAL DRAFT BL 00595854/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
A FINAL DRAFT BL 00595854/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
A FINAL DRAFT BL 00595854/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
A FINAL DRAFT BL 00595854/jli.dll
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
A FINAL DRAFT BL 00595854/jli.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
A FINAL DRAFT BL 00595854/msvcpcore.dll
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
A FINAL DRAFT BL 00595854/msvcpcore.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
A FINAL DRAFT BL 00595854/vcruntime140.dll
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
A FINAL DRAFT BL 00595854/vcruntime140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
A FINAL DRAFT BL 00595854/vcruntime140_1.dll
Resource
win7-20240704-en
Behavioral task
behavioral13
Sample
A FINAL DRAFT BL 00595854/vcruntime140_1.dll
Resource
win10v2004-20240802-en
General
-
Target
A FINAL DRAFT BL 00595854/A FINAL DRAFT BL 00595854.exe
-
Size
24KB
-
MD5
2f8c33ab91e3897522bb6add4b6e1375
-
SHA1
dd6159fe631838b3bf1bf27bc90ea1acbaf381c4
-
SHA256
d0f5829a3fe65ff01901b2742e9e19cbb848d5b55452103ab1b8c82e87fa6872
-
SHA512
da28c79295704dc476ea28c69cfe9108b75be68912c7455d6b6eb6e3df07c6bd6e704f586433d79a3580bfb313cf459b2626d5ce34e3bc85b787b82a83358a3b
-
SSDEEP
768:+tSqfNFDB5jKxnVbgvqxNdKcSHJK/Y/+hP7:ESq3B5jKxnKvKNdKBHJK/n
Malware Config
Extracted
formbook
4.1
be28
nsrrsdda.xyz
amut-sakhon-party-539528511.fyi
icholas-paaac.buzz
heirwellnessbuzz.buzz
mhgriu.xyz
etropixel.info
959725nkrowrf140.top
oxicsh.click
iobet-casino1.online
ome-care-81701.bond
lhrristorpky.xyz
ucko.info
ryson-saaab.buzz
aming-monitor-69835.bond
puf7.shop
armageddon.net
58799.top
rainfood.online
ahjong168.vip
arjetas-empresariales-pro.xyz
eb-k12.tech
brnr.info
cekbola.pro
uyurlar-mobile-ozel.xyz
v1pz6f2lqxe16xn.asia
ao.world
nm1quj.shop
arectormail.xyz
lectric-cars-64678.bond
packorea.net
hanhlamtech.xyz
ccq1233.men
npate.shop
angkulslot.net
edsport.live
yfault2movie.online
etirement-plans-96735.bond
u-pair-service-89673.bond
asino-wulcan-slots.xyz
ijdarshan.tech
o250.shop
ockyjapan.net
rhgtrfd.buzz
budhabimedia.net
p188nm.net
rsm.info
echnew.shop
ogelpandawa.company
ilipala.red
aiote.host
ebastian-paaab.buzz
griculture-jobs-67746.bond
ris-knowledge-base.online
rasiva.xyz
oudoarew.top
tpays.online
itchen-appliances-43678.bond
odsarmor.online
igahoki89.forum
r-outsourcing-61237.bond
48420805.top
orklift-jobs-29768.bond
ires-11110.bond
ata-protection-82346.bond
ushi-77.lat
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1044-0-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1044-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1472-8-0x0000000000940000-0x000000000096F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4092 set thread context of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 1044 set thread context of 3552 1044 ngen.exe 56 PID 1472 set thread context of 3552 1472 control.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1044 ngen.exe 1044 ngen.exe 1044 ngen.exe 1044 ngen.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe 1472 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1044 ngen.exe 1044 ngen.exe 1044 ngen.exe 1472 control.exe 1472 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4092 A FINAL DRAFT BL 00595854.exe Token: SeDebugPrivilege 1044 ngen.exe Token: SeDebugPrivilege 1472 control.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3552 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4092 wrote to memory of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 4092 wrote to memory of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 4092 wrote to memory of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 4092 wrote to memory of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 4092 wrote to memory of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 4092 wrote to memory of 1044 4092 A FINAL DRAFT BL 00595854.exe 85 PID 3552 wrote to memory of 1472 3552 Explorer.EXE 87 PID 3552 wrote to memory of 1472 3552 Explorer.EXE 87 PID 3552 wrote to memory of 1472 3552 Explorer.EXE 87 PID 1472 wrote to memory of 4424 1472 control.exe 89 PID 1472 wrote to memory of 4424 1472 control.exe 89 PID 1472 wrote to memory of 4424 1472 control.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\A FINAL DRAFT BL 00595854\A FINAL DRAFT BL 00595854.exe"C:\Users\Admin\AppData\Local\Temp\A FINAL DRAFT BL 00595854\A FINAL DRAFT BL 00595854.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4424
-
-