Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 01:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
BASF PETRONAS Chemicals - RFQ.exe
Resource
win7-20240708-en
General
-
Target
BASF PETRONAS Chemicals - RFQ.exe
-
Size
1.0MB
-
MD5
fd400f9fdd400093e67d0692b24eca96
-
SHA1
ef09de86c8868d634924edd815f83211a8760964
-
SHA256
367c5877d8f75cdc6d3f42c0f5a43f37d5faa47f74ab9be2a5f508a678de65fd
-
SHA512
37f29e4c5ccc0f59d6d0a6cbdf6be50a400946b428bc4886c6eb6be041edd14b6ed9da2e8c85addc8ec93113db7929cd4855275194d84f52e513fddf6b821f18
-
SSDEEP
24576:gAHnh+eWsN3skA4RV1Hom2KXMmHaAQVZBUQ0Wjz5:Xh+ZkldoPK8YaAQVzUQP
Malware Config
Extracted
formbook
4.1
wh6a
tair-lift-42713.bond
ventura-homes.net
anvasbackred.shop
icksandmore.net
untsvilleboatrentals.net
xyv.lat
hbvc.xyz
uang88-toko.xyz
ersonalisedwrappingpaper.online
reepoin1.buzz
hosemansisthis.xyz
64kyt6v.christmas
qgbiwbk.shop
reywolfcdn.net
rupovvz.online
ras-es-0.bond
latitudinarian.world
eamautorent.online
rioritymarketingsolutions.world
merican-viplata-peoplleua.world
stronavigation.website
analones-51-us-spn.today
etjuidl.shop
andscaping-services-69347.bond
ransportationmdsmtpro.top
ufeyu.online
esterspace.xyz
races-dental-splints-20853.bond
ipplikj.click
ir-bez-graniz.net
panish-classes-58894.bond
ext4you.net
1game.fyi
tnfw3193.vip
ntyvirus.online
et988.shop
2q.biz
uke-saaab.buzz
nline-shopping-41258.bond
lbazar.net
24876.top
50p.xyz
oleccionamera.xyz
uperapp.app
2578.asia
fgwalzk.xyz
ecretoasiatico.fun
325555.vip
uayang1982.net
ert-gep.info
gc4cpam.christmas
eyzz.online
hampi.info
panish-classes-63390.bond
qzxx.top
cessovip.tech
oth.live
orekotusurubu.shop
eolives.net
urebets.vip
amigataboyz-dreamisland.net
9ds87666.men
rycoz.online
8dn2r1us2.buzz
nfotracktmc.top
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2412-12-0x00000000006A0000-0x00000000006CF000-memory.dmp formbook behavioral2/memory/2412-16-0x00000000006A0000-0x00000000006CF000-memory.dmp formbook behavioral2/memory/2428-21-0x00000000008F0000-0x000000000091F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3552 set thread context of 2412 3552 BASF PETRONAS Chemicals - RFQ.exe 88 PID 2412 set thread context of 3464 2412 svchost.exe 56 PID 2428 set thread context of 3464 2428 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BASF PETRONAS Chemicals - RFQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2428 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE 2428 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3552 BASF PETRONAS Chemicals - RFQ.exe 3552 BASF PETRONAS Chemicals - RFQ.exe 2412 svchost.exe 2412 svchost.exe 2412 svchost.exe 2428 NETSTAT.EXE 2428 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2412 svchost.exe Token: SeDebugPrivilege 2428 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3552 BASF PETRONAS Chemicals - RFQ.exe 3552 BASF PETRONAS Chemicals - RFQ.exe 3464 Explorer.EXE 3464 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3552 BASF PETRONAS Chemicals - RFQ.exe 3552 BASF PETRONAS Chemicals - RFQ.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3464 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3552 wrote to memory of 2412 3552 BASF PETRONAS Chemicals - RFQ.exe 88 PID 3552 wrote to memory of 2412 3552 BASF PETRONAS Chemicals - RFQ.exe 88 PID 3552 wrote to memory of 2412 3552 BASF PETRONAS Chemicals - RFQ.exe 88 PID 3552 wrote to memory of 2412 3552 BASF PETRONAS Chemicals - RFQ.exe 88 PID 3464 wrote to memory of 2428 3464 Explorer.EXE 89 PID 3464 wrote to memory of 2428 3464 Explorer.EXE 89 PID 3464 wrote to memory of 2428 3464 Explorer.EXE 89 PID 2428 wrote to memory of 1000 2428 NETSTAT.EXE 95 PID 2428 wrote to memory of 1000 2428 NETSTAT.EXE 95 PID 2428 wrote to memory of 1000 2428 NETSTAT.EXE 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals - RFQ.exe"C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals - RFQ.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\BASF PETRONAS Chemicals - RFQ.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
Network
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request68.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request157.123.68.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.stronavigation.websiteIN AResponse
-
Remote address:8.8.8.8:53Requestwww.nfotracktmc.topIN AResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.ecretoasiatico.funIN AResponse
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.etjuidl.shopIN AResponse
-
Remote address:8.8.8.8:53Requestwww.eamautorent.onlineIN AResponse
-
Remote address:8.8.8.8:53Requestwww.icksandmore.netIN AResponse
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
68.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
157.123.68.40.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
www.stronavigation.website
-
65 B 135 B 1 1
DNS Request
www.nfotracktmc.top
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
68 B 133 B 1 1
DNS Request
www.ecretoasiatico.fun
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
-
62 B 119 B 1 1
DNS Request
www.etjuidl.shop
-
68 B 133 B 1 1
DNS Request
www.eamautorent.online
-
65 B 138 B 1 1
DNS Request
www.icksandmore.net