Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
Ministry of Health Kingdom of Bahrain.exe
Resource
win7-20240903-en
General
-
Target
Ministry of Health Kingdom of Bahrain.exe
-
Size
358KB
-
MD5
e1a110c51c33c12ee53679c40c954395
-
SHA1
361ca3b8600138c93a6cb8728ddefd7bb1be53ef
-
SHA256
ad4c2025f6a3741ba965e53a40e907b04dd1031c666e80d98afe6fd00c70239d
-
SHA512
8572c6c49eca57c0a89523df94c73eb65617687c4e89045633eeafb05f2844f6c14df7ef0e61fa05a1cae39d5fa664d8e206c6cccadcacc03d749a9b0caefdfb
-
SSDEEP
6144:l2rbJsMkhBseyKyjTzBfRARSBPu6aNpSc68iHGrGSD/7o8aIm2eW8ggs:liSBseyxjT9yRSJaNpriH5SL7BaXO
Malware Config
Extracted
formbook
4.1
ey5a
lygptkl.com
winsentrade.com
bluprintliving.com
yumohealth.com
cherryadulttoys.com
gianttigar.com
maxhutmacher.net
autostokyocorp.com
calvaryload.com
stixxiepix.com
j98152.com
starsky666.xyz
loadkicks.com
designauraspace.com
wwwfmcna.com
mikakonaitopsychologist.com
kristalsuaritma.com
kh180.com
kulturel.net
araveenapark.com
sniffandwhiffcandles.com
sihambaz.xyz
lcmdcatalogs.com
panncakeswwoap.com
kmxwzl.com
clientes-personas.online
juragantrader.com
tridimensionallab.com
adtechobservability.com
jaqaya.com
w9qdg3f.xyz
shaiyahp.online
algarvebnb.com
travelingpretty.com
terone2pack.com
salonlinw.com
i-craft-admin.com
thejoyismcoach.com
eas-rightofway.com
apacegov.net
endearingmonuments.com
healthyd-ductcleaning.com
av141.xyz
buscatuempresa.com
mobilechor.com
empanadasycakesfranchus.com
demtate.xyz
orlandonotarymobile.com
atdkdesign.com
dijitalportal.net
allisonkimart.online
la-souche.com
mrstonecrest.com
yanghetang.net
takinghe.online
gzdfzx.com
zx0558.top
vimarohomes.com
swm87.com
rewritepapers.com
macrotroics.net
dimitris.life
cornholeleague.life
access-inurance.com
puwuved.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3564-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3564-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3920-22-0x0000000000EC0000-0x0000000000EEF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4400 set thread context of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 3564 set thread context of 3352 3564 Ministry of Health Kingdom of Bahrain.exe 55 PID 3920 set thread context of 3352 3920 svchost.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ministry of Health Kingdom of Bahrain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3564 Ministry of Health Kingdom of Bahrain.exe 3564 Ministry of Health Kingdom of Bahrain.exe 3564 Ministry of Health Kingdom of Bahrain.exe 3564 Ministry of Health Kingdom of Bahrain.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe 3920 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3564 Ministry of Health Kingdom of Bahrain.exe 3564 Ministry of Health Kingdom of Bahrain.exe 3564 Ministry of Health Kingdom of Bahrain.exe 3920 svchost.exe 3920 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3564 Ministry of Health Kingdom of Bahrain.exe Token: SeDebugPrivilege 3920 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 4400 wrote to memory of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 4400 wrote to memory of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 4400 wrote to memory of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 4400 wrote to memory of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 4400 wrote to memory of 3564 4400 Ministry of Health Kingdom of Bahrain.exe 91 PID 3352 wrote to memory of 3920 3352 Explorer.EXE 92 PID 3352 wrote to memory of 3920 3352 Explorer.EXE 92 PID 3352 wrote to memory of 3920 3352 Explorer.EXE 92 PID 3920 wrote to memory of 2176 3920 svchost.exe 93 PID 3920 wrote to memory of 2176 3920 svchost.exe 93 PID 3920 wrote to memory of 2176 3920 svchost.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-