Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe
Resource
win7-20240708-en
General
-
Target
1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe
-
Size
397KB
-
MD5
134e7cb7484eabfbab70b96763bf9051
-
SHA1
d4c7881c41908a28908a32e46ab01e0f82afcbe4
-
SHA256
1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1
-
SHA512
059ad8b692b8a7b7a92e222bc82caf8b304063a924c75367d42477222185b98f6b31613db1699439a0a9b6b0b7de0ae0c56fea97bc3ec9c039f146b517cfa214
-
SSDEEP
6144:j1FxhzvZ74J5spMIUYYKUeq7a/WUuufzttMOtQb5:j7v54Jq1B6L7UuuLbM9b5
Malware Config
Extracted
formbook
4.1
rn10
kedai168et.com
mental-olympics.com
pussybuildsstrongbones.net
857691.shop
hisellers.net
exposurecophotography.com
beaded-boutique.net
wednesdayholdings.com
plesacv.xyz
manonlineros.com
a0204.shop
333689g.com
dyprl716h.xyz
pulseirabet.com
fnet.work
bo-2024-001-v1-d1.xyz
ongaurdsecurity.com
giulianacristini.com
miladamani.com
magicalrealmshopkeeper.online
dy62i.com
pfjxhzz.com
yieks.voto
wallseason.com
kclsec.xyz
findwineinspace.com
everydayoptics.com
pg15.top
schody.net
82647351.com
fluteindia.com
infominer.club
kedai168el.com
compuglobalhypermeganet.app
designs-by-syn.com
godmachines.net
play-fortuna-ahf.buzz
lyjxk.com
waysfundraising.online
topuptalkmore.com
jingalraid.cfd
stonebahis411.com
adonicfuran.xyz
5z1lcnbm.fun
ignitorite.com
375bey.xyz
oloutlets.com
jn66-com-opqrst99988.com
xins.live
buchstabieralphabet.info
sfazzino.com
facai86.xyz
rapidsignsystems.com
golightresins.com
fpsportsmedia.com
superpawbulous.com
qsigoqav.xyz
anshtiwari314.online
flood-risk.net
voegbedrijf-offerte.com
onliinnforrmmosa.com
duangendget.store
georgiausssa.xyz
boldmusicmgt.com
teamhore724.buzz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4204-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1188 set thread context of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 4204 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 4204 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 4204 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101 PID 1188 wrote to memory of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101 PID 1188 wrote to memory of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101 PID 1188 wrote to memory of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101 PID 1188 wrote to memory of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101 PID 1188 wrote to memory of 4204 1188 1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe"C:\Users\Admin\AppData\Local\Temp\1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe"C:\Users\Admin\AppData\Local\Temp\1259432f41bd872ef92450755035a516b40fcae624473c3dbd64efe7d89987b1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3872 /prefetch:81⤵PID:972