Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
6a86727505f9aacbb6e9d67445b8e99d23e37d9db46a737e1b2c72274332cb41.ps1
Resource
win7-20240903-en
General
-
Target
6a86727505f9aacbb6e9d67445b8e99d23e37d9db46a737e1b2c72274332cb41.ps1
-
Size
1.4MB
-
MD5
eaf957fed02fc143802d3eff11d4dddf
-
SHA1
ce04e0cbca0fd7e1abe322a7f94a7eb01ddf72cb
-
SHA256
6a86727505f9aacbb6e9d67445b8e99d23e37d9db46a737e1b2c72274332cb41
-
SHA512
ae164f196583f7a2a6b12a902fa118e30a0f653700c30aa17ab97219b9c5f6eaaad3f765fab89b6ff5da48b521f283c45c73e20d38e76ff6c2c55f99b82df612
-
SSDEEP
12288:zJW/kYR3J9bXwjnA7fUL64zJuk8q0UmA1NzENYgnBKPqSY29oPtrPN4In5VreTCf:fs/vQL4uY
Malware Config
Extracted
formbook
4.1
j3gd
lpumanagement.com
seafreshindia.com
progetto-energia.com
anthonyconstantis.com
wuhanyinyue.com
rimflso.com
zayedcenter.net
toggturkish.com
grayshottspalife.com
migliorarelasalute.website
micj1426.com
salicosmetic.com
renospro.com
fantasiegeschichten.com
velvetgoo.art
chasernt.online
mojogrup.com
beer-app.com
workitsexyguru.com
rmhansonfreelancewriting.com
03c3tnpvnu16sxlpreu2281.com
thesolitairebliss.com
meshworksmanagement.com
womento.kitchen
trippytigerzteaparty.com
ellemediallc.com
organonacademy.com
aprabha.com
natifar7884.com
groupeosiris-afrique.com
tedswoodworking16000.com
cardgalaxyapp.com
bajutidur.xyz
gettheforkouttampa.com
luxivana.com
americanvrfarm.com
qypcurso.xyz
anguillalitfest.com
dirigirbem.com
evolvehemb.com
photographyofcharlotte.com
springhousemanagement.com
domainedemontessori.com
adoniobet.com
travelermeet.com
mtools-usa.com
lulushomecakery.com
aaronparecki.xyz
moderevolt.com
bookhousehotel.com
carcof.com
kolomalabs.com
4on6.com
boostblackgirllove.com
differentesports.com
motherearthhaulers.com
pacificpaymentprocessing.com
sinooceancastle.com
smothe.today
aisoulspa.com
rentventory.com
oota-group.com
aryuzhou.net
as1-6hg9amazon.com
fracturedmindset.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4456-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4456-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1140-32-0x0000000000610000-0x000000000063F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4448 set thread context of 4456 4448 powershell.exe 83 PID 4456 set thread context of 3500 4456 calc.exe 56 PID 1140 set thread context of 3500 1140 netsh.exe 56 -
pid Process 4448 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4448 powershell.exe 4456 calc.exe 4456 calc.exe 4456 calc.exe 4456 calc.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe 1140 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4456 calc.exe 4456 calc.exe 4456 calc.exe 1140 netsh.exe 1140 netsh.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 4456 calc.exe Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE Token: SeDebugPrivilege 1140 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4456 4448 powershell.exe 83 PID 4448 wrote to memory of 4456 4448 powershell.exe 83 PID 4448 wrote to memory of 4456 4448 powershell.exe 83 PID 4448 wrote to memory of 4456 4448 powershell.exe 83 PID 4448 wrote to memory of 4456 4448 powershell.exe 83 PID 4448 wrote to memory of 4456 4448 powershell.exe 83 PID 3500 wrote to memory of 1140 3500 Explorer.EXE 84 PID 3500 wrote to memory of 1140 3500 Explorer.EXE 84 PID 3500 wrote to memory of 1140 3500 Explorer.EXE 84 PID 1140 wrote to memory of 844 1140 netsh.exe 89 PID 1140 wrote to memory of 844 1140 netsh.exe 89 PID 1140 wrote to memory of 844 1140 netsh.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\6a86727505f9aacbb6e9d67445b8e99d23e37d9db46a737e1b2c72274332cb41.ps12⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\WINDOWS\syswow64\calc.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\WINDOWS\syswow64\calc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82