Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 16:22

General

  • Target

    acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe

  • Size

    1.0MB

  • MD5

    e9e768aa357a7e34348c69e41444964d

  • SHA1

    4930b85e20b7967cf0afb1d9ae9ae57ca4d373c9

  • SHA256

    acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b

  • SHA512

    6394564277e7077d9e326cc0f34f3c6ef945ed4d2e6bd812daaef879bb957edd4c8032df14774328799c692cbfb1f784fbf3580e65effdc5d2d42f124f62bb3a

  • SSDEEP

    12288:LKLRCoZzl+CN6XYt8GjKtzp422BxYLWM7Wi9h77:LiCoZzkg8tzpH2BK17L9h77

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

igbn

Decoy

daolangfans.com

creatievecontentpeople.com

cargizmos.net

azure1224.xyz

shopahava.com

recursum.com

rumblerain.com

betmonde396.com

webinarcerdaskanindonesia.com

telemaca.com

hellohurt.com

peaceprairie.com

johntheonlinearborist.com

pilotbxprt.store

creatingsobriety.com

getrightspt.com

104456.com

travelsofwray.com

americagroupperu.com

silberscore.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Users\Admin\AppData\Local\Temp\acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe
      "C:\Users\Admin\AppData\Local\Temp\acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4784
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

    Filesize

    42KB

    MD5

    9827ff3cdf4b83f9c86354606736ca9c

    SHA1

    e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

    SHA256

    c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

    SHA512

    8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

  • memory/2868-33-0x0000000000E00000-0x0000000000E2F000-memory.dmp

    Filesize

    188KB

  • memory/2868-29-0x0000000000E50000-0x0000000000E67000-memory.dmp

    Filesize

    92KB

  • memory/2868-31-0x0000000000E50000-0x0000000000E67000-memory.dmp

    Filesize

    92KB

  • memory/3272-7-0x0000000005F30000-0x0000000005F3A000-memory.dmp

    Filesize

    40KB

  • memory/3272-12-0x000000000BBC0000-0x000000000BF14000-memory.dmp

    Filesize

    3.3MB

  • memory/3272-6-0x0000000005530000-0x0000000005560000-memory.dmp

    Filesize

    192KB

  • memory/3272-0-0x0000000074A3E000-0x0000000074A3F000-memory.dmp

    Filesize

    4KB

  • memory/3272-9-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3272-10-0x0000000007340000-0x000000000735A000-memory.dmp

    Filesize

    104KB

  • memory/3272-11-0x0000000009980000-0x0000000009986000-memory.dmp

    Filesize

    24KB

  • memory/3272-5-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3272-13-0x000000000BF70000-0x000000000BF92000-memory.dmp

    Filesize

    136KB

  • memory/3272-1-0x00000000005A0000-0x00000000006AE000-memory.dmp

    Filesize

    1.1MB

  • memory/3272-4-0x0000000005180000-0x000000000521C000-memory.dmp

    Filesize

    624KB

  • memory/3272-18-0x0000000074A30000-0x00000000751E0000-memory.dmp

    Filesize

    7.7MB

  • memory/3272-2-0x0000000005690000-0x0000000005C34000-memory.dmp

    Filesize

    5.6MB

  • memory/3272-3-0x00000000050E0000-0x0000000005172000-memory.dmp

    Filesize

    584KB

  • memory/3460-28-0x00000000084C0000-0x0000000008614000-memory.dmp

    Filesize

    1.3MB

  • memory/3460-23-0x00000000084C0000-0x0000000008614000-memory.dmp

    Filesize

    1.3MB

  • memory/3460-27-0x0000000008CE0000-0x0000000008E7D000-memory.dmp

    Filesize

    1.6MB

  • memory/3460-34-0x0000000008CE0000-0x0000000008E7D000-memory.dmp

    Filesize

    1.6MB

  • memory/3460-37-0x0000000007ED0000-0x0000000007F7A000-memory.dmp

    Filesize

    680KB

  • memory/3460-39-0x0000000007ED0000-0x0000000007F7A000-memory.dmp

    Filesize

    680KB

  • memory/3460-40-0x0000000007ED0000-0x0000000007F7A000-memory.dmp

    Filesize

    680KB

  • memory/4784-26-0x0000000001960000-0x0000000001974000-memory.dmp

    Filesize

    80KB

  • memory/4784-25-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4784-21-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4784-22-0x00000000015E0000-0x00000000015F4000-memory.dmp

    Filesize

    80KB

  • memory/4784-19-0x0000000001AA0000-0x0000000001DEA000-memory.dmp

    Filesize

    3.3MB

  • memory/4784-15-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB