Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
PO 211210-02B.exe
Resource
win7-20241010-en
General
-
Target
PO 211210-02B.exe
-
Size
1.0MB
-
MD5
4064e9b07c90788942f5d4ca84fe93dd
-
SHA1
9e7b93ea418d60a11d191a9d0a368d2880c2abb0
-
SHA256
98318bf03a710984e1eaa61e8fe1ceb1f78cefb0de3ee8168dff8e4b144d6b42
-
SHA512
067eb0ffeff7d61c3bf5b1cb8f28df9432f564d055b4a730573b37ce51aaaff9766b00aec072e3177b730ff3a4dbe635b1964fbb0667c713ec5a0e6c88a65f8e
-
SSDEEP
24576:qlEGxQTnyni55j63p5zpKeZJ6wprm0W7nNM5VtcYTPy0AiQmywV7Nt+bSp/l:qpxayniu3/tKeZZpr/W7wBTPHRQBYBtX
Malware Config
Extracted
formbook
4.1
kz21
affordableshopper.com
federalpensioneducation.com
nguyenphuc.xyz
tbryantnotarysvcs.com
satgerv.online
yis.xyz
sailing-dreams.online
saairconditioners.com
compassioncommunity.net
vickyrubs.com
uniqueprorental.com
xplus-main.xyz
beforetravelthai.com
mentaltrainer.net
bianko.xyz
postsandnews.com
stream-king.com
citizen.guide
lasuiterennes.com
elektroexpress24.com
kolkatanewspaper.xyz
digitalstore.space
konglish.xyz
cultureangel.com
carelegend.com
illuminategodslove.com
realisatiedomein3.com
homes62.com
leapsoffaithwaterskiers.com
shihuod.com
masteknoloji.net
vifi-web.com
winchesterstablesofvermont.com
theholdscarborough.com
sf9oh3.net
usdbet797.com
economiareale.info
gearinternetdeals.com
new-carbuycrossoversuv.website
losconquistadoreshotel.com
storetees.art
hotelkompendium.com
hohmbathhouse.com
graviitycloud.online
mewstralia.com
domesticelectriciankent.com
rentalserver-kurabe.com
jrkennington.com
register-coinex.online
iywin.com
laviniaribeiro.site
lorodicahmdpa22.xyz
mebelrosso.com
topratedales.com
kastyelie.xyz
weeventos.com
szefrxsa.xyz
fyuc.info
competition-malachite.com
onlinebatch.space
ida-info.com
fakeituntil.com
lm-safe-keepingmdpa22.xyz
tammooz.site
cingetkuiert.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/3016-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3016-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2864-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2600 set thread context of 3016 2600 PO 211210-02B.exe 29 PID 3016 set thread context of 1192 3016 PO 211210-02B.exe 20 PID 2864 set thread context of 1192 2864 ipconfig.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO 211210-02B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2864 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3016 PO 211210-02B.exe 3016 PO 211210-02B.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe 2864 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3016 PO 211210-02B.exe 3016 PO 211210-02B.exe 3016 PO 211210-02B.exe 2864 ipconfig.exe 2864 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3016 PO 211210-02B.exe Token: SeDebugPrivilege 2864 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 2600 wrote to memory of 3016 2600 PO 211210-02B.exe 29 PID 1192 wrote to memory of 2864 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2864 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2864 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2864 1192 Explorer.EXE 31 PID 2864 wrote to memory of 2732 2864 ipconfig.exe 32 PID 2864 wrote to memory of 2732 2864 ipconfig.exe 32 PID 2864 wrote to memory of 2732 2864 ipconfig.exe 32 PID 2864 wrote to memory of 2732 2864 ipconfig.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2796
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO 211210-02B.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
-