Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 01:56

General

  • Target

    acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe

  • Size

    1.0MB

  • MD5

    e9e768aa357a7e34348c69e41444964d

  • SHA1

    4930b85e20b7967cf0afb1d9ae9ae57ca4d373c9

  • SHA256

    acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b

  • SHA512

    6394564277e7077d9e326cc0f34f3c6ef945ed4d2e6bd812daaef879bb957edd4c8032df14774328799c692cbfb1f784fbf3580e65effdc5d2d42f124f62bb3a

  • SSDEEP

    12288:LKLRCoZzl+CN6XYt8GjKtzp422BxYLWM7Wi9h77:LiCoZzkg8tzpH2BK17L9h77

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

igbn

Decoy

daolangfans.com

creatievecontentpeople.com

cargizmos.net

azure1224.xyz

shopahava.com

recursum.com

rumblerain.com

betmonde396.com

webinarcerdaskanindonesia.com

telemaca.com

hellohurt.com

peaceprairie.com

johntheonlinearborist.com

pilotbxprt.store

creatingsobriety.com

getrightspt.com

104456.com

travelsofwray.com

americagroupperu.com

silberscore.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe
    "C:\Users\Admin\AppData\Local\Temp\acb23b92beb1de31d7175c94f94854887bc0b2adb90faddc89bf1b14b1bd1a4b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:428
    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
      2⤵
      • Executes dropped EXE
      PID:4796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 184
        3⤵
        • Program crash
        PID:1744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4796 -ip 4796
    1⤵
      PID:4964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

      Filesize

      42KB

      MD5

      9827ff3cdf4b83f9c86354606736ca9c

      SHA1

      e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

      SHA256

      c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

      SHA512

      8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

    • memory/428-9-0x0000000074520000-0x0000000074CD0000-memory.dmp

      Filesize

      7.7MB

    • memory/428-12-0x000000000CD90000-0x000000000D0E4000-memory.dmp

      Filesize

      3.3MB

    • memory/428-3-0x0000000005260000-0x00000000052F2000-memory.dmp

      Filesize

      584KB

    • memory/428-4-0x0000000005300000-0x000000000539C000-memory.dmp

      Filesize

      624KB

    • memory/428-5-0x0000000074520000-0x0000000074CD0000-memory.dmp

      Filesize

      7.7MB

    • memory/428-6-0x00000000056A0000-0x00000000056D0000-memory.dmp

      Filesize

      192KB

    • memory/428-2-0x0000000005810000-0x0000000005DB4000-memory.dmp

      Filesize

      5.6MB

    • memory/428-10-0x0000000007490000-0x00000000074AA000-memory.dmp

      Filesize

      104KB

    • memory/428-7-0x0000000005F80000-0x0000000005F8A000-memory.dmp

      Filesize

      40KB

    • memory/428-11-0x0000000009AD0000-0x0000000009AD6000-memory.dmp

      Filesize

      24KB

    • memory/428-0-0x000000007452E000-0x000000007452F000-memory.dmp

      Filesize

      4KB

    • memory/428-13-0x000000000D160000-0x000000000D182000-memory.dmp

      Filesize

      136KB

    • memory/428-1-0x00000000006F0000-0x00000000007FE000-memory.dmp

      Filesize

      1.1MB

    • memory/428-20-0x0000000074520000-0x0000000074CD0000-memory.dmp

      Filesize

      7.7MB

    • memory/4796-17-0x0000000000380000-0x00000000003AF000-memory.dmp

      Filesize

      188KB