Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 06:04 UTC

General

  • Target

    54dc29f95416b335e2657153e01c1fe014796bdd6bc75299f4edda45d98a2444.exe

  • Size

    676KB

  • MD5

    9af19623b16664a281a2ed28b9ff4c20

  • SHA1

    4334592619c9c22697a03115d3557479dd39e0ed

  • SHA256

    54dc29f95416b335e2657153e01c1fe014796bdd6bc75299f4edda45d98a2444

  • SHA512

    fdc5e3ad4a1b171e2a4f6275a346964bd265e0d60cab267bce0d9db11324136a808c14ef8152b5c533ebb7788b7880d54e2648fc012e6ee58801490971edd72b

  • SSDEEP

    12288:yLgWTG4ma0voAqtWJevyZT6ykN/s+H1Sj4Q2TOvYNttS0e5lv:o7Tb0gAqt7vyppqV04Q2iANttS7z

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hy08

Decoy

weazc.top

servoceimmpajhnuz.info

vqemkdhi.xyz

wergol.com

spa-mk.com

rtpsid88.life

tatetits.fun

raidsa.xyz

suojiansuode.net

jointhejunction.com

wudai.net

typeboot.shop

mksport-app.com

miocloud.ovh

taipan77pandan.com

wwwhg58a.com

khuahamiksai31.pro

carpedatumllc.net

safebinders.com

krx21.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54dc29f95416b335e2657153e01c1fe014796bdd6bc75299f4edda45d98a2444.exe
    "C:\Users\Admin\AppData\Local\Temp\54dc29f95416b335e2657153e01c1fe014796bdd6bc75299f4edda45d98a2444.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\54dc29f95416b335e2657153e01c1fe014796bdd6bc75299f4edda45d98a2444.exe
      "C:\Users\Admin\AppData\Local\Temp\54dc29f95416b335e2657153e01c1fe014796bdd6bc75299f4edda45d98a2444.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1484

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    104.219.191.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    104.219.191.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    136.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    136.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    209.205.72.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    209.205.72.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    98.117.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    98.117.19.2.in-addr.arpa
    IN PTR
    Response
    98.117.19.2.in-addr.arpa
    IN PTR
    a2-19-117-98deploystaticakamaitechnologiescom
  • flag-us
    DNS
    101.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    101.210.23.2.in-addr.arpa
    IN PTR
    Response
    101.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-101deploystaticakamaitechnologiescom
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    48.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    48.229.111.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    104.219.191.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    104.219.191.52.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    136.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    136.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    209.205.72.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    209.205.72.20.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    98.117.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    98.117.19.2.in-addr.arpa

  • 8.8.8.8:53
    101.210.23.2.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    101.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    48.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    48.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/920-6-0x0000000004F80000-0x000000000501C000-memory.dmp

    Filesize

    624KB

  • memory/920-13-0x0000000074D00000-0x00000000754B0000-memory.dmp

    Filesize

    7.7MB

  • memory/920-2-0x0000000005290000-0x0000000005834000-memory.dmp

    Filesize

    5.6MB

  • memory/920-3-0x0000000004CE0000-0x0000000004D72000-memory.dmp

    Filesize

    584KB

  • memory/920-4-0x0000000074D00000-0x00000000754B0000-memory.dmp

    Filesize

    7.7MB

  • memory/920-5-0x0000000004C80000-0x0000000004C8A000-memory.dmp

    Filesize

    40KB

  • memory/920-8-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

    Filesize

    4KB

  • memory/920-0-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

    Filesize

    4KB

  • memory/920-1-0x0000000000340000-0x00000000003F0000-memory.dmp

    Filesize

    704KB

  • memory/920-9-0x0000000074D00000-0x00000000754B0000-memory.dmp

    Filesize

    7.7MB

  • memory/920-10-0x0000000007810000-0x0000000007886000-memory.dmp

    Filesize

    472KB

  • memory/920-7-0x0000000005190000-0x00000000051AA000-memory.dmp

    Filesize

    104KB

  • memory/1484-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1484-14-0x0000000001980000-0x0000000001CCA000-memory.dmp

    Filesize

    3.3MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.