Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2024, 06:38

General

  • Target

    Ministry of Health Kingdom of Bahrain.exe

  • Size

    358KB

  • MD5

    e1a110c51c33c12ee53679c40c954395

  • SHA1

    361ca3b8600138c93a6cb8728ddefd7bb1be53ef

  • SHA256

    ad4c2025f6a3741ba965e53a40e907b04dd1031c666e80d98afe6fd00c70239d

  • SHA512

    8572c6c49eca57c0a89523df94c73eb65617687c4e89045633eeafb05f2844f6c14df7ef0e61fa05a1cae39d5fa664d8e206c6cccadcacc03d749a9b0caefdfb

  • SSDEEP

    6144:l2rbJsMkhBseyKyjTzBfRARSBPu6aNpSc68iHGrGSD/7o8aIm2eW8ggs:liSBseyxjT9yRSJaNpriH5SL7BaXO

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ey5a

Decoy

lygptkl.com

winsentrade.com

bluprintliving.com

yumohealth.com

cherryadulttoys.com

gianttigar.com

maxhutmacher.net

autostokyocorp.com

calvaryload.com

stixxiepix.com

j98152.com

starsky666.xyz

loadkicks.com

designauraspace.com

wwwfmcna.com

mikakonaitopsychologist.com

kristalsuaritma.com

kh180.com

kulturel.net

araveenapark.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3352
    • C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe
      "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe
        "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3564
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Ministry of Health Kingdom of Bahrain.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3352-30-0x00000000029F0000-0x0000000002B02000-memory.dmp

    Filesize

    1.1MB

  • memory/3352-28-0x00000000029F0000-0x0000000002B02000-memory.dmp

    Filesize

    1.1MB

  • memory/3352-27-0x00000000029F0000-0x0000000002B02000-memory.dmp

    Filesize

    1.1MB

  • memory/3352-23-0x0000000002700000-0x00000000027F7000-memory.dmp

    Filesize

    988KB

  • memory/3352-18-0x0000000002700000-0x00000000027F7000-memory.dmp

    Filesize

    988KB

  • memory/3564-14-0x0000000001570000-0x00000000018BA000-memory.dmp

    Filesize

    3.3MB

  • memory/3564-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3564-17-0x0000000001540000-0x0000000001555000-memory.dmp

    Filesize

    84KB

  • memory/3564-11-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3920-22-0x0000000000EC0000-0x0000000000EEF000-memory.dmp

    Filesize

    188KB

  • memory/3920-21-0x0000000000660000-0x000000000066E000-memory.dmp

    Filesize

    56KB

  • memory/3920-19-0x0000000000660000-0x000000000066E000-memory.dmp

    Filesize

    56KB

  • memory/4400-6-0x00000000055F0000-0x00000000055FA000-memory.dmp

    Filesize

    40KB

  • memory/4400-13-0x00000000753A0000-0x0000000075B50000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-10-0x0000000006F90000-0x0000000006FE8000-memory.dmp

    Filesize

    352KB

  • memory/4400-9-0x0000000006E50000-0x0000000006EEC000-memory.dmp

    Filesize

    624KB

  • memory/4400-8-0x00000000753A0000-0x0000000075B50000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-7-0x00000000753AE000-0x00000000753AF000-memory.dmp

    Filesize

    4KB

  • memory/4400-0-0x00000000753AE000-0x00000000753AF000-memory.dmp

    Filesize

    4KB

  • memory/4400-5-0x0000000005310000-0x000000000531A000-memory.dmp

    Filesize

    40KB

  • memory/4400-4-0x00000000753A0000-0x0000000075B50000-memory.dmp

    Filesize

    7.7MB

  • memory/4400-3-0x0000000005160000-0x00000000051F2000-memory.dmp

    Filesize

    584KB

  • memory/4400-2-0x0000000005710000-0x0000000005CB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4400-1-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB