Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
ORDER.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ORDER.exe
Resource
win10v2004-20240802-en
General
-
Target
ORDER.exe
-
Size
1.1MB
-
MD5
2a2ee6dc6b324aed33389ca52bb82005
-
SHA1
7fa45dad561f81d5a892b3ec84e8fad4ed751e82
-
SHA256
51fff4f47965c96f05725a7655150c7dad217117e8c4b393a02b5b9a415747cb
-
SHA512
c83ed263130e762b7f89341be52abaddda581215476536095856f0bd9b17244f43b98617de88f51c9247c0ca3c2ab1a5c8af3f13540ce99177ec02ff1a329ad7
-
SSDEEP
24576:dAHnh+eWsN3skA4RV1Hom2KXMmHa7bubTGMel5uz5:8h+ZkldoPK8Ya7sbe3K
Malware Config
Extracted
formbook
4.1
to12
petnossa.shop
dtmt.online
ikonkablo.online
voguewear-to.com
thekachorichhori.com
frozenstarch.com
auto888vip.net
day.lol
wangxunas.asia
myultimategoal.xyz
thuthurahat.store
00050427.xyz
ifcexpo.com
lctglobal.com
liamcollinai.com
sisibytundun.com
multiverseearth.com
bt365950.com
vbuyshouses.com
bidbarrel.com
ljjkx.com
farmoviva.com
expertaccounting.net
shop-wcyw.com
skilledrvrepairs.com
soltixgroup.com
agendamentoentrega.store
ai-tools-46155.bond
xumzu.xyz
vx67.top
shtfofus.xyz
jocs.xyz
art4zenbyscribtine.com
t1sport.online
swindallwelding.com
yourgamelist.com
randypughtravel.com
onwall.xyz
knbcapitalfunding.com
xavxg.xyz
spiocx.xyz
cash-universal.com
cheapsleeves.com
justkidssports.com
yerfmvav.xyz
aalishome.com
barheadseedco.com
lyonstree.com
krx26.com
justincandyreviews.com
liposuction-51459.bond
castelaimoveis.online
comediantes.shop
mvmntunfiltered.com
dlimspunjabgovpk.com
slipgatecentral.net
ufdrbdfsfestysfle.net
optiadvisor.com
uuds4lsg.com
threelcc.com
97577.club
qmljg.xyz
yyzb.tech
casinoramada47.com
saktibalak.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2756-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2756-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1132-20-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 600 set thread context of 2756 600 ORDER.exe 30 PID 2756 set thread context of 1304 2756 svchost.exe 21 PID 1132 set thread context of 1304 1132 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2756 svchost.exe 2756 svchost.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 600 ORDER.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 1132 help.exe 1132 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2756 svchost.exe Token: SeDebugPrivilege 1132 help.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 600 ORDER.exe 600 ORDER.exe 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 600 ORDER.exe 600 ORDER.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 600 wrote to memory of 2756 600 ORDER.exe 30 PID 600 wrote to memory of 2756 600 ORDER.exe 30 PID 600 wrote to memory of 2756 600 ORDER.exe 30 PID 600 wrote to memory of 2756 600 ORDER.exe 30 PID 600 wrote to memory of 2756 600 ORDER.exe 30 PID 1304 wrote to memory of 1132 1304 Explorer.EXE 62 PID 1304 wrote to memory of 1132 1304 Explorer.EXE 62 PID 1304 wrote to memory of 1132 1304 Explorer.EXE 62 PID 1304 wrote to memory of 1132 1304 Explorer.EXE 62 PID 1132 wrote to memory of 2708 1132 help.exe 63 PID 1132 wrote to memory of 2708 1132 help.exe 63 PID 1132 wrote to memory of 2708 1132 help.exe 63 PID 1132 wrote to memory of 2708 1132 help.exe 63
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\ORDER.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\ORDER.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2820
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2916
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2920
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2936
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2960
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1180
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2816
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2804
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2796
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2008
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2956
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2824
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2604
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2700
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2996
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3032
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3036
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3044
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2932
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2344
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2800
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2828
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2712
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2720
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2944
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2664
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2660
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2684
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2716
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2736
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2632
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-