Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 06:38

General

  • Target

    Ministry of Health Kingdom of Bahrain.exe

  • Size

    358KB

  • MD5

    e1a110c51c33c12ee53679c40c954395

  • SHA1

    361ca3b8600138c93a6cb8728ddefd7bb1be53ef

  • SHA256

    ad4c2025f6a3741ba965e53a40e907b04dd1031c666e80d98afe6fd00c70239d

  • SHA512

    8572c6c49eca57c0a89523df94c73eb65617687c4e89045633eeafb05f2844f6c14df7ef0e61fa05a1cae39d5fa664d8e206c6cccadcacc03d749a9b0caefdfb

  • SSDEEP

    6144:l2rbJsMkhBseyKyjTzBfRARSBPu6aNpSc68iHGrGSD/7o8aIm2eW8ggs:liSBseyxjT9yRSJaNpriH5SL7BaXO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ey5a

Decoy

lygptkl.com

winsentrade.com

bluprintliving.com

yumohealth.com

cherryadulttoys.com

gianttigar.com

maxhutmacher.net

autostokyocorp.com

calvaryload.com

stixxiepix.com

j98152.com

starsky666.xyz

loadkicks.com

designauraspace.com

wwwfmcna.com

mikakonaitopsychologist.com

kristalsuaritma.com

kh180.com

kulturel.net

araveenapark.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe
      "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe
        "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2220
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2736
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:2704
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:2796
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            2⤵
              PID:2788
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:2588
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:2160
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:2936
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:2792
                    • C:\Windows\SysWOW64\autochk.exe
                      "C:\Windows\SysWOW64\autochk.exe"
                      2⤵
                        PID:2876
                      • C:\Windows\SysWOW64\autochk.exe
                        "C:\Windows\SysWOW64\autochk.exe"
                        2⤵
                          PID:2460
                        • C:\Windows\SysWOW64\autochk.exe
                          "C:\Windows\SysWOW64\autochk.exe"
                          2⤵
                            PID:2824
                          • C:\Windows\SysWOW64\autochk.exe
                            "C:\Windows\SysWOW64\autochk.exe"
                            2⤵
                              PID:2852
                            • C:\Windows\SysWOW64\autochk.exe
                              "C:\Windows\SysWOW64\autochk.exe"
                              2⤵
                                PID:2604
                              • C:\Windows\SysWOW64\autochk.exe
                                "C:\Windows\SysWOW64\autochk.exe"
                                2⤵
                                  PID:3032
                                • C:\Windows\SysWOW64\autochk.exe
                                  "C:\Windows\SysWOW64\autochk.exe"
                                  2⤵
                                    PID:2716
                                  • C:\Windows\SysWOW64\autochk.exe
                                    "C:\Windows\SysWOW64\autochk.exe"
                                    2⤵
                                      PID:2744
                                    • C:\Windows\SysWOW64\autochk.exe
                                      "C:\Windows\SysWOW64\autochk.exe"
                                      2⤵
                                        PID:2748
                                      • C:\Windows\SysWOW64\autochk.exe
                                        "C:\Windows\SysWOW64\autochk.exe"
                                        2⤵
                                          PID:2692
                                        • C:\Windows\SysWOW64\autochk.exe
                                          "C:\Windows\SysWOW64\autochk.exe"
                                          2⤵
                                            PID:2868
                                          • C:\Windows\SysWOW64\autochk.exe
                                            "C:\Windows\SysWOW64\autochk.exe"
                                            2⤵
                                              PID:2580
                                            • C:\Windows\SysWOW64\autochk.exe
                                              "C:\Windows\SysWOW64\autochk.exe"
                                              2⤵
                                                PID:2576
                                              • C:\Windows\SysWOW64\autochk.exe
                                                "C:\Windows\SysWOW64\autochk.exe"
                                                2⤵
                                                  PID:2596
                                                • C:\Windows\SysWOW64\autochk.exe
                                                  "C:\Windows\SysWOW64\autochk.exe"
                                                  2⤵
                                                    PID:2612
                                                  • C:\Windows\SysWOW64\autochk.exe
                                                    "C:\Windows\SysWOW64\autochk.exe"
                                                    2⤵
                                                      PID:2652
                                                    • C:\Windows\SysWOW64\autochk.exe
                                                      "C:\Windows\SysWOW64\autochk.exe"
                                                      2⤵
                                                        PID:2700
                                                      • C:\Windows\SysWOW64\autochk.exe
                                                        "C:\Windows\SysWOW64\autochk.exe"
                                                        2⤵
                                                          PID:3012
                                                        • C:\Windows\SysWOW64\autochk.exe
                                                          "C:\Windows\SysWOW64\autochk.exe"
                                                          2⤵
                                                            PID:2384
                                                          • C:\Windows\SysWOW64\autochk.exe
                                                            "C:\Windows\SysWOW64\autochk.exe"
                                                            2⤵
                                                              PID:2872
                                                            • C:\Windows\SysWOW64\autochk.exe
                                                              "C:\Windows\SysWOW64\autochk.exe"
                                                              2⤵
                                                                PID:3016
                                                              • C:\Windows\SysWOW64\autochk.exe
                                                                "C:\Windows\SysWOW64\autochk.exe"
                                                                2⤵
                                                                  PID:768
                                                                • C:\Windows\SysWOW64\msiexec.exe
                                                                  "C:\Windows\SysWOW64\msiexec.exe"
                                                                  2⤵
                                                                  • Suspicious use of SetThreadContext
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious behavior: MapViewOfSection
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:2624
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /c del "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"
                                                                    3⤵
                                                                    • Deletes itself
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1300

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • memory/1176-20-0x0000000004530000-0x00000000045FD000-memory.dmp

                                                                Filesize

                                                                820KB

                                                              • memory/1176-31-0x0000000005160000-0x000000000528A000-memory.dmp

                                                                Filesize

                                                                1.2MB

                                                              • memory/1176-25-0x0000000004530000-0x00000000045FD000-memory.dmp

                                                                Filesize

                                                                820KB

                                                              • memory/1176-24-0x0000000005160000-0x000000000528A000-memory.dmp

                                                                Filesize

                                                                1.2MB

                                                              • memory/2220-16-0x0000000000870000-0x0000000000B73000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/2220-18-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/2220-23-0x0000000000260000-0x0000000000275000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/2220-7-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/2220-9-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/2220-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2220-14-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/2220-22-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/2220-19-0x0000000000210000-0x0000000000225000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/2500-4-0x00000000745EE000-0x00000000745EF000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2500-0-0x00000000745EE000-0x00000000745EF000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2500-5-0x00000000745E0000-0x0000000074CCE000-memory.dmp

                                                                Filesize

                                                                6.9MB

                                                              • memory/2500-15-0x00000000745E0000-0x0000000074CCE000-memory.dmp

                                                                Filesize

                                                                6.9MB

                                                              • memory/2500-6-0x0000000000BB0000-0x0000000000C08000-memory.dmp

                                                                Filesize

                                                                352KB

                                                              • memory/2500-3-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                Filesize

                                                                40KB

                                                              • memory/2500-2-0x00000000745E0000-0x0000000074CCE000-memory.dmp

                                                                Filesize

                                                                6.9MB

                                                              • memory/2500-1-0x0000000000CA0000-0x0000000000D00000-memory.dmp

                                                                Filesize

                                                                384KB

                                                              • memory/2624-26-0x00000000003F0000-0x0000000000404000-memory.dmp

                                                                Filesize

                                                                80KB

                                                              • memory/2624-27-0x00000000003F0000-0x0000000000404000-memory.dmp

                                                                Filesize

                                                                80KB

                                                              • memory/2624-29-0x00000000003F0000-0x0000000000404000-memory.dmp

                                                                Filesize

                                                                80KB

                                                              • memory/2624-30-0x0000000000130000-0x000000000015F000-memory.dmp

                                                                Filesize

                                                                188KB