Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 17:38

General

  • Target

    e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1

  • Size

    420KB

  • MD5

    e3095c7f50ad6559e8aa569390c1fa94

  • SHA1

    e79ac8e78b26dee69a424325932e33cbe41c779e

  • SHA256

    30fbbb57213f860b61302762e7a6febcd16b1ce982c57be120fc92436f40eda2

  • SHA512

    fcde747c26d38e196647ce2f74649459ea2c911e1fa1d9c164b5b941bf683cb90b1b9a68d9611db355fa79cc5d3b130e235dc17033271177a775d1f8d4600362

  • SSDEEP

    12288:JZUvtaGX86HF/vpF8MdvXV2fm9r3EAVF57ZV13:Jlidl/vAcAe13EAZZ/3

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

pm

Decoy

pinkdolphingame.com

littlecarprice.com

zhangjinkai.com

daveycoin.com

brcomatualizacaobb.com

greenworldarg.com

constructorarabguar.com

0pe140.com

onevanillavariety.com

thedispensaryuk.com

missmomth.com

thealpha.biz

jjapanese.com

infinihybrid.com

bydcosmetics.com

jvboisoj.win

smartarchiving.com

kremesomorfias.com

akku2life.com

llbag.win

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\e3095c7f50ad6559e8aa569390c1fa94_JaffaCakes118.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Public\zvbh.exe
        "C:\Users\Public\zvbh.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1768
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\cmd.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logim.jpeg

    Filesize

    79KB

    MD5

    fa9626f61b86aa02cccf64bb086eef40

    SHA1

    91e663cd185a52fda340c88d85fd807c69b54f01

    SHA256

    d5facf56cfa1914c29e5a03af901b7df1f43882ed7c50d0488182e2db72b97a1

    SHA512

    20ce1e4fb61fd6814dff4bb298e8c80d63ed484425aa8a318df260920919d17daa30b6fb3933efd4348352f0b15a95160aabc20226d4f6fb2a05e0a5989571ca

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logri.ini

    Filesize

    40B

    MD5

    d63a82e5d81e02e399090af26db0b9cb

    SHA1

    91d0014c8f54743bba141fd60c9d963f869d76c9

    SHA256

    eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

    SHA512

    38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

  • C:\Users\Admin\AppData\Roaming\3237pPEE\323logrv.ini

    Filesize

    40B

    MD5

    ba3b6bc807d4f76794c4b81b09bb9ba5

    SHA1

    24cb89501f0212ff3095ecc0aba97dd563718fb1

    SHA256

    6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

    SHA512

    ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

  • C:\Users\Public\zvbh.exe

    Filesize

    299KB

    MD5

    2a561db2bbc97c16b70d2bba0b7519ce

    SHA1

    34f116f1fe59fba53d3a1974b4cb8d2abe525cbf

    SHA256

    6bb2dcc633b72774e13fa0f0fbc938eebf4726e46d4eb7676d8ee3990878ffb6

    SHA512

    b93677c5e2960c1e801cdb269fbf4f6ea3b3f1801c969b096c7372ddd23a65b97dcf5628af1f99c2912d71cb13f0038fc827fb523f2a075e0c1d4669bc1c7142

  • C:\Windows\win.ini

    Filesize

    517B

    MD5

    893cae59ab5945a94a7da007d47a1255

    SHA1

    d4cfd81c6647ca64022bd307c08a7fb4bbbd4c06

    SHA256

    edfa0f2d3bea9f737e0315971c6f81d3d8e7d460b60a19351ada0316a093c938

    SHA512

    d66e454781f54f45df814ad32d687b0f100578c2a4ffca62de81add04281fb881a550702bd2d058933d3736d14e88624af268a86ce24b0c3935242b206ffdcc9

  • \Users\Admin\AppData\Local\Temp\System.dll

    Filesize

    12KB

    MD5

    0d7ad4f45dc6f5aa87f606d0331c6901

    SHA1

    48df0911f0484cbe2a8cdd5362140b63c41ee457

    SHA256

    3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    SHA512

    c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

  • \Users\Admin\AppData\Local\Temp\checkouts.dll

    Filesize

    10KB

    MD5

    926e963b53e59a9bb30483c470f52d3a

    SHA1

    51bd24b9f5a6cc15cfa29d9e39c088fb370e7f6a

    SHA256

    95295695b542e26c667f6c37958439448a8ba311e63d3cf9fb07e428dc77560f

    SHA512

    43d3176f0c1fc90362fa964077eee3c4510d940cb1aaa30720ec0186d2247cb8824d4a73134026d3bf2427a02a4562eccdd9f2db074fe6723e18995f4393f9e2

  • memory/1232-10054-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/1232-10064-0x0000000007620000-0x000000000775C000-memory.dmp

    Filesize

    1.2MB

  • memory/1232-10061-0x0000000007410000-0x0000000007500000-memory.dmp

    Filesize

    960KB

  • memory/1232-10055-0x0000000007410000-0x0000000007500000-memory.dmp

    Filesize

    960KB

  • memory/1768-10049-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1768-10058-0x0000000000090000-0x0000000000096000-memory.dmp

    Filesize

    24KB

  • memory/1768-10053-0x00000000001F0000-0x0000000000204000-memory.dmp

    Filesize

    80KB

  • memory/1768-10052-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1768-10050-0x0000000000970000-0x0000000000C73000-memory.dmp

    Filesize

    3.0MB

  • memory/1768-10048-0x0000000000090000-0x0000000000096000-memory.dmp

    Filesize

    24KB

  • memory/2232-10056-0x0000000000E10000-0x0000000000E28000-memory.dmp

    Filesize

    96KB

  • memory/2232-10059-0x0000000000E10000-0x0000000000E28000-memory.dmp

    Filesize

    96KB

  • memory/2564-38-0x0000000000440000-0x000000000044A000-memory.dmp

    Filesize

    40KB

  • memory/2564-60-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2564-61-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2564-10047-0x0000000000460000-0x0000000000480000-memory.dmp

    Filesize

    128KB

  • memory/2668-4-0x000007FEF5BBE000-0x000007FEF5BBF000-memory.dmp

    Filesize

    4KB

  • memory/2668-27-0x000007FEF5900000-0x000007FEF629D000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-8-0x000007FEF5900000-0x000007FEF629D000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-9-0x000007FEF5900000-0x000007FEF629D000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-10-0x000007FEF5900000-0x000007FEF629D000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-7-0x000007FEF5900000-0x000007FEF629D000-memory.dmp

    Filesize

    9.6MB

  • memory/2668-6-0x00000000022D0000-0x00000000022D8000-memory.dmp

    Filesize

    32KB

  • memory/2668-5-0x000000001B580000-0x000000001B862000-memory.dmp

    Filesize

    2.9MB