Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2024, 01:04 UTC

General

  • Target

    14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe

  • Size

    604KB

  • MD5

    dd2e0becfb1316c49975386fc3367c45

  • SHA1

    98c578ff997ef781919ca5967251fa9d462a756e

  • SHA256

    14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628

  • SHA512

    4768fa7aa32dc02e958c8506880311bb0d4fa5a9cd9fcdc6581a8349b1d85b3323513d28018b55ffbdb79e440e4b371dfb260cbd097ffd2279993b9a1a416bfb

  • SSDEEP

    12288:MVVeXpcIofxcshf8R5wjY/nCdfpfwzW2kTFzcdppLLO:eePofZhf8BnCbft2kajy

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b48n

Decoy

anifestmindset.net

ommybahamabigsales.shop

3tcxr.xyz

iano-world.net

rconf23.net

atherpa.shop

trllrpartners.club

5sawit777.pro

ctbhuxcdreioijresol.top

opinatlas.app

pinstar.xyz

mfengwa.top

8games13.xyz

tickpaket.online

iphuodongallbbtbtm.top

ental-bridges-51593.bond

laywithkemon.rest

lkpiou.xyz

a88.land

igfloppafan.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe
    "C:\Users\Admin\AppData\Local\Temp\14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe
      "C:\Users\Admin\AppData\Local\Temp\14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe"
      2⤵
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe
        "C:\Users\Admin\AppData\Local\Temp\14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1848-6-0x0000000005C70000-0x0000000005CE6000-memory.dmp

      Filesize

      472KB

    • memory/1848-1-0x0000000000E90000-0x0000000000F2C000-memory.dmp

      Filesize

      624KB

    • memory/1848-2-0x0000000073EE0000-0x00000000745CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1848-3-0x0000000000520000-0x0000000000538000-memory.dmp

      Filesize

      96KB

    • memory/1848-4-0x0000000073EEE000-0x0000000073EEF000-memory.dmp

      Filesize

      4KB

    • memory/1848-5-0x0000000073EE0000-0x00000000745CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1848-0-0x0000000073EEE000-0x0000000073EEF000-memory.dmp

      Filesize

      4KB

    • memory/1848-15-0x0000000073EE0000-0x00000000745CE000-memory.dmp

      Filesize

      6.9MB

    • memory/2704-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2704-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2704-14-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2704-9-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2704-16-0x0000000000900000-0x0000000000C03000-memory.dmp

      Filesize

      3.0MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.