Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
skmbt ref 10072022.exe
Resource
win7-20240903-en
General
-
Target
skmbt ref 10072022.exe
-
Size
933KB
-
MD5
dc681c0d1b1a68760efaa3d0e30c265c
-
SHA1
b9af8e985e07a8ca11a5b81e7353428015c824ad
-
SHA256
866ff728d933b6a13b260cb79be66e9d17069f15fb7458673d313f6d7590864a
-
SHA512
fb1b39aba32987f6a84617870e5b3cfc9a6c54726979ad9608082b78135d91a35fd4c4ae7bd63f90c35e51d138c9d7952d93daef9ebc62f4dcbb880fd23d5de2
-
SSDEEP
12288:wGrI2iNQxZU/LPBBmJw5afc8WBuSSVwwuizH+BllvMo3Y6J2u:wGs1gUjPBwwIWcSSSeze3d3Q
Malware Config
Extracted
formbook
4.1
a1n9
mundodasmaquininhas.net
smop2.info
xn--chriemonrve-cbbu.com
kalebet977.com
inmobiliarianb.com
watersmartaz.com
xyz.gallery
sadiztech.com
traiteur-albi.fr
blocks.icu
hangrypancreas.com
saysosoulcards.com
rightforearth.com
swifty.network
bettwsrfc.co.uk
bcausemarketing.com
thaibjbar.com
zurisfashion.store
optimisescreencleaner.com
couponsjoe.com
obatsakitkanker.com
steelandcements.com
genitorisicresce.com
wwwhx951.com
kalaimani.com
wholesaleknafeh.com
house-pr.com
cameronrusticdesign.com
guiadadieta.com
italianfeetjob.com
popupdocs.net
costretch4life.com
zwnvgz.com
athlete-exchange.net
interactspeechanddrama.com
corstorphinett.club
fearofmovingforward.com
thinkbracknell.com
haberindibi.com
liamx.com
guoranspace.net
lindaedwards-music.com
recurringrevenue.online
lfxindi.com
top-of-taxi.com
domagojvida.com
joulesjordan.com
cashflowsmoothing.com
masteren-marketing-digital1.com
quoternion.com
shedsofslidell.com
jfdxpctb.net
dropmwe.online
stay2stay.com
babymoko.com
medianalyst.com
mottiinvestments.com
ppctrends.com
cemepeng.com
villainmanikata.com
servibracional.com
listgi.com
oinknoodle.com
coms-en.icu
mireolife.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4032-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4032-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3560-24-0x0000000000350000-0x000000000037F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2380 set thread context of 4032 2380 skmbt ref 10072022.exe 101 PID 4032 set thread context of 3508 4032 skmbt ref 10072022.exe 56 PID 3560 set thread context of 3508 3560 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skmbt ref 10072022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2380 skmbt ref 10072022.exe 2380 skmbt ref 10072022.exe 2380 skmbt ref 10072022.exe 2380 skmbt ref 10072022.exe 4032 skmbt ref 10072022.exe 4032 skmbt ref 10072022.exe 4032 skmbt ref 10072022.exe 4032 skmbt ref 10072022.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe 3560 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4032 skmbt ref 10072022.exe 4032 skmbt ref 10072022.exe 4032 skmbt ref 10072022.exe 3560 wscript.exe 3560 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2380 skmbt ref 10072022.exe Token: SeDebugPrivilege 4032 skmbt ref 10072022.exe Token: SeDebugPrivilege 3560 wscript.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1768 2380 skmbt ref 10072022.exe 99 PID 2380 wrote to memory of 1768 2380 skmbt ref 10072022.exe 99 PID 2380 wrote to memory of 1768 2380 skmbt ref 10072022.exe 99 PID 2380 wrote to memory of 4396 2380 skmbt ref 10072022.exe 100 PID 2380 wrote to memory of 4396 2380 skmbt ref 10072022.exe 100 PID 2380 wrote to memory of 4396 2380 skmbt ref 10072022.exe 100 PID 2380 wrote to memory of 4032 2380 skmbt ref 10072022.exe 101 PID 2380 wrote to memory of 4032 2380 skmbt ref 10072022.exe 101 PID 2380 wrote to memory of 4032 2380 skmbt ref 10072022.exe 101 PID 2380 wrote to memory of 4032 2380 skmbt ref 10072022.exe 101 PID 2380 wrote to memory of 4032 2380 skmbt ref 10072022.exe 101 PID 2380 wrote to memory of 4032 2380 skmbt ref 10072022.exe 101 PID 3508 wrote to memory of 3560 3508 Explorer.EXE 102 PID 3508 wrote to memory of 3560 3508 Explorer.EXE 102 PID 3508 wrote to memory of 3560 3508 Explorer.EXE 102 PID 3560 wrote to memory of 4348 3560 wscript.exe 103 PID 3560 wrote to memory of 4348 3560 wscript.exe 103 PID 3560 wrote to memory of 4348 3560 wscript.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"3⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"3⤵PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\skmbt ref 10072022.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-