Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
Ministry of Health Kingdom of Bahrain.exe
Resource
win7-20240903-en
General
-
Target
Ministry of Health Kingdom of Bahrain.exe
-
Size
358KB
-
MD5
e1a110c51c33c12ee53679c40c954395
-
SHA1
361ca3b8600138c93a6cb8728ddefd7bb1be53ef
-
SHA256
ad4c2025f6a3741ba965e53a40e907b04dd1031c666e80d98afe6fd00c70239d
-
SHA512
8572c6c49eca57c0a89523df94c73eb65617687c4e89045633eeafb05f2844f6c14df7ef0e61fa05a1cae39d5fa664d8e206c6cccadcacc03d749a9b0caefdfb
-
SSDEEP
6144:l2rbJsMkhBseyKyjTzBfRARSBPu6aNpSc68iHGrGSD/7o8aIm2eW8ggs:liSBseyxjT9yRSJaNpriH5SL7BaXO
Malware Config
Extracted
formbook
4.1
ey5a
lygptkl.com
winsentrade.com
bluprintliving.com
yumohealth.com
cherryadulttoys.com
gianttigar.com
maxhutmacher.net
autostokyocorp.com
calvaryload.com
stixxiepix.com
j98152.com
starsky666.xyz
loadkicks.com
designauraspace.com
wwwfmcna.com
mikakonaitopsychologist.com
kristalsuaritma.com
kh180.com
kulturel.net
araveenapark.com
sniffandwhiffcandles.com
sihambaz.xyz
lcmdcatalogs.com
panncakeswwoap.com
kmxwzl.com
clientes-personas.online
juragantrader.com
tridimensionallab.com
adtechobservability.com
jaqaya.com
w9qdg3f.xyz
shaiyahp.online
algarvebnb.com
travelingpretty.com
terone2pack.com
salonlinw.com
i-craft-admin.com
thejoyismcoach.com
eas-rightofway.com
apacegov.net
endearingmonuments.com
healthyd-ductcleaning.com
av141.xyz
buscatuempresa.com
mobilechor.com
empanadasycakesfranchus.com
demtate.xyz
orlandonotarymobile.com
atdkdesign.com
dijitalportal.net
allisonkimart.online
la-souche.com
mrstonecrest.com
yanghetang.net
takinghe.online
gzdfzx.com
zx0558.top
vimarohomes.com
swm87.com
rewritepapers.com
macrotroics.net
dimitris.life
cornholeleague.life
access-inurance.com
puwuved.xyz
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2220-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2220-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2220-22-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2624-30-0x0000000000130000-0x000000000015F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1300 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2500 set thread context of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2220 set thread context of 1176 2220 Ministry of Health Kingdom of Bahrain.exe 21 PID 2220 set thread context of 1176 2220 Ministry of Health Kingdom of Bahrain.exe 21 PID 2624 set thread context of 1176 2624 msiexec.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ministry of Health Kingdom of Bahrain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2220 Ministry of Health Kingdom of Bahrain.exe 2220 Ministry of Health Kingdom of Bahrain.exe 2220 Ministry of Health Kingdom of Bahrain.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe 2624 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2220 Ministry of Health Kingdom of Bahrain.exe 2220 Ministry of Health Kingdom of Bahrain.exe 2220 Ministry of Health Kingdom of Bahrain.exe 2220 Ministry of Health Kingdom of Bahrain.exe 2624 msiexec.exe 2624 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2220 Ministry of Health Kingdom of Bahrain.exe Token: SeDebugPrivilege 2624 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 2500 wrote to memory of 2220 2500 Ministry of Health Kingdom of Bahrain.exe 31 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 1176 wrote to memory of 2624 1176 Explorer.EXE 62 PID 2624 wrote to memory of 1300 2624 msiexec.exe 63 PID 2624 wrote to memory of 1300 2624 msiexec.exe 63 PID 2624 wrote to memory of 1300 2624 msiexec.exe 63 PID 2624 wrote to memory of 1300 2624 msiexec.exe 63
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2736
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2704
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2796
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2788
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2588
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2160
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2936
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2792
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2876
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2460
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2824
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2852
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2604
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3032
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2716
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2744
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2748
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2692
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2868
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2580
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2576
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2596
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2612
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2652
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2700
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3012
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2384
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2872
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3016
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:768
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1300
-
-