Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
IMG_20220926_0001.exe
Resource
win7-20241010-en
General
-
Target
IMG_20220926_0001.exe
-
Size
1016KB
-
MD5
c29ade6cb629271fa32e3ecc97757826
-
SHA1
7113cc1f08981d89e4038d7159744e39dec08168
-
SHA256
7a2a46ce8e2392d8f1afc79912f86e540c30f1a8428ec455f14182c0131403ed
-
SHA512
ade3953e9ceb93875b91ffb77131a2b76a1bf763d34f0c690f44f178c35522bc5cf023671b98c73dca51ebb4ed3844f325cbacaf3ae6882541fbb3b902b7977e
-
SSDEEP
12288:edBMsHT+oXKSslNvgT5PqdOHQYleaIqHLJnt16K4HTN:yBRz+hOsOweIqrJt1
Malware Config
Extracted
formbook
4.1
te04
oaif.rest
snapchat25.site
ampenova.online
xn--kj0b57geuvy9e.shop
bravobistro.xyz
meebits-freemint.xyz
namaz.city
tdmanagement.info
ytumz.xyz
industrialized.shop
laviedouceexperience.com
aubolabel.com
semblally.shop
vistlink.makeup
adidaihoka.com
gabrielmanfredi.online
sheka.xyz
bcvn2.club
digitalwebtricks.com
poocoin-app-charts.online
landsharesfg.net
qxlbjp.store
dumptrailers4rent.com
today-trends-reviews.info
jfdhobbies.online
socialgamers.online
qahomecom.com
newbutterflyfoundation.com
winegunmen.com
transmecsped.com
xmsolutions.net
dkbbankingonline.click
ftuesgxb.work
runut.top
private-jet.click
courtesanscanada.com
xpressewa.store
atlantahomicide.net
34986.top
hkexchange.one
camper-deal.store
armadameganrental.com
kippcollegiateathleticzone.com
zijadsare.space
skia-fafb.life
fiumaralupin.space
gabrieliglesias2024.com
zhaopp1.buzz
meetapub.com
ju-8523.com
teamin.tech
douban.work
arubapiana.cloud
86602.top
musicbooksus.com
veganingrids.store
odukart.com
temporary123.website
altnmaia.com
friendshipengineers.com
euyasminmiranda.com
baijuyun.xyz
billiedruryrealtor.com
marachui-resort.com
joannedifrisco.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2796-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2796-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2812-26-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2380 set thread context of 2796 2380 IMG_20220926_0001.exe 31 PID 2796 set thread context of 1200 2796 IMG_20220926_0001.exe 21 PID 2812 set thread context of 1200 2812 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_20220926_0001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2796 IMG_20220926_0001.exe 2796 IMG_20220926_0001.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe 2812 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2796 IMG_20220926_0001.exe 2796 IMG_20220926_0001.exe 2796 IMG_20220926_0001.exe 2812 explorer.exe 2812 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2796 IMG_20220926_0001.exe Token: SeDebugPrivilege 2812 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 2380 wrote to memory of 2796 2380 IMG_20220926_0001.exe 31 PID 1200 wrote to memory of 2812 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2812 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2812 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2812 1200 Explorer.EXE 32 PID 2812 wrote to memory of 2676 2812 explorer.exe 33 PID 2812 wrote to memory of 2676 2812 explorer.exe 33 PID 2812 wrote to memory of 2676 2812 explorer.exe 33 PID 2812 wrote to memory of 2676 2812 explorer.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2676
-
-