Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe
Resource
win7-20240708-en
General
-
Target
8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe
-
Size
2.1MB
-
MD5
3d93ad3d9374e100842fc9a5c683d86b
-
SHA1
6d84040392c2b071dd1546a85ce7c8f527d7e1b3
-
SHA256
8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac
-
SHA512
d87baae4c95e41bf82c60c705638d010e3e6e7aa66a95adb9e4280ab2f9acf8b6f633c919f9ef4bc69bac0d700f010c2d72643aacffac4878e7855b3528e40f1
-
SSDEEP
12288:LB9rRHQ435jKIJE/yGcn5k9BTFE1ksbRz0A7JFVTr/EJ:d9rpQ4BGcATFokMT/n8
Malware Config
Extracted
formbook
4.1
oi12
exobello.bio
boinga.xyz
animasriversurf.com
gamesflashg.com
hayatbagievleri.online
washington-living.com
july7.store
x-pod-technologies.com
farmhouseflaire.com
qb52aa.top
datasynthing.xyz
5v28n.rest
legacycommerceltd.com
mundodelosjuguetes.com
wjblades.com
z9b6g8.com
eskimotech.net
dreziuy.xyz
bestsolarcompanies.services
vertemisconsulting.com
rockinrioviagogo.com
acimed.net
tdrfwb.shop
xd4tp.top
bihungoreng19.click
tcnhbv301y.top
triumphbusinessconsultancy.com
menuconfig.store
seikoubento.com
defiram.com
bespokearomatics.com
yellprint.com
flickeringlc.christmas
aidiagnostics.xyz
ok66g.app
z3o6i8.com
dacoylomarkemilcajes.online
rummymeett.xyz
arazivearsa.xyz
crystalpalaces.store
qtsandbox.com
wkbbb.com
abusedcode.com
puzzle-escape.info
jagoboss.com
seguro-pagamento.life
luxindicator.site
mxtp.coffee
okumafishing.xyz
gaffelshop.shop
optimusgs.com
qtsandbox.com
bt365332.com
kernphoto.art
p0uhx.pro
agsaydinlatma.online
korbidholdings.net
nsservicescorp.com
healthcare-trends-22748.bond
xtraslot.link
travelblitarjuandabmtrans.com
linlinda.com
gnonhcav.xyz
05544.xyz
selalujadipemenang.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1416-5-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1416-8-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3164-15-0x0000000001370000-0x000000000139F000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 39 3164 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 856 set thread context of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 1416 set thread context of 3480 1416 aspnet_wp.exe 56 PID 3164 set thread context of 3480 3164 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1416 aspnet_wp.exe 1416 aspnet_wp.exe 1416 aspnet_wp.exe 1416 aspnet_wp.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe 3164 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1416 aspnet_wp.exe 1416 aspnet_wp.exe 1416 aspnet_wp.exe 3164 cmd.exe 3164 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1416 aspnet_wp.exe Token: SeShutdownPrivilege 3480 Explorer.EXE Token: SeCreatePagefilePrivilege 3480 Explorer.EXE Token: SeDebugPrivilege 3164 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3480 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 856 wrote to memory of 2572 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 87 PID 856 wrote to memory of 2572 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 87 PID 856 wrote to memory of 2572 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 87 PID 856 wrote to memory of 5028 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 88 PID 856 wrote to memory of 5028 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 88 PID 856 wrote to memory of 5028 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 88 PID 856 wrote to memory of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 856 wrote to memory of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 856 wrote to memory of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 856 wrote to memory of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 856 wrote to memory of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 856 wrote to memory of 1416 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 89 PID 856 wrote to memory of 964 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 90 PID 856 wrote to memory of 964 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 90 PID 856 wrote to memory of 964 856 8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe 90 PID 3480 wrote to memory of 3164 3480 Explorer.EXE 94 PID 3480 wrote to memory of 3164 3480 Explorer.EXE 94 PID 3480 wrote to memory of 3164 3480 Explorer.EXE 94 PID 3164 wrote to memory of 552 3164 cmd.exe 95 PID 3164 wrote to memory of 552 3164 cmd.exe 95 PID 3164 wrote to memory of 552 3164 cmd.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe"C:\Users\Admin\AppData\Local\Temp\8ac8568934d1a0ab9a9923449bf11c0d44d97abca0bcabd60b94348642f046ac.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵PID:5028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_wp.exe"3⤵
- System Location Discovery: System Language Discovery
PID:552
-
-