Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
ORDER NO VOL- 6542 335 22.exe
Resource
win7-20240903-en
General
-
Target
ORDER NO VOL- 6542 335 22.exe
-
Size
1.0MB
-
MD5
d59478fd8ef62d1006e85001c3ac59f3
-
SHA1
aaf63576f5f1f412547c51bee18f88deeb06d36a
-
SHA256
af9c39c609e5cda424ed4cd2fbe7f32c0d9d2936754d41c098a7dec269c42fd2
-
SHA512
7184b20f299cf019d9a8f260fc8fd135b7e5b558a4e4061b10f2930a80949aef67de2bd9293770585cef7a677fdacef69cbaa61a688905118c717d4ced98999c
-
SSDEEP
24576:E1RcJw0mlJ5noiNiGLU8GXplgs8PErrmDgvqOR:Ezc6jnvQr8GQormDIjR
Malware Config
Extracted
formbook
nquy
a3sidprVANFTG0llIjdA
amYQhcIbS9blLB0=
GOqH7AZQZTYBOB8vWeHGwCVnUw==
kp1yw+EwVCesxslPY5gtZ2aiBcRa
zV/0O1+y47mCh6+5
uX0OU3R898WRBa/Rog==
6val8whPkGM9wuxTFGNI
ozzlSYzyF/XOgNSKG5fsoNYzkk+pxgDF
sHo2h6PuHfFwtOdTFGNI
xZ54yOceUB/thMxtzhp4wCVnUw==
s4pIou5HdD3C1snrARcqXw==
jiOqEVW81qEjTIs5ouY+1hZ3MGvCJg==
Nga3BkamwZ4gVmz0fb5KkYs=
DNeA3Bp8vJpd8VPogb5KkYs=
tbZjsdPoeu0sRcPUqA==
RToES3S3EqV3+g2XLLtFzOHPMXwE7JvN
+c+C3eYzcETJ8hehDlIno5I=
3KE0kK71Hf/ODgNTFGNI
MPrCqTAJbjGx
fkXl/0uKuIgIDPB+aeTYSA==
Ie+2DzGk0K1uGmsDfr5KkYs=
scl/0wJ2pH4FSI87r/1NjNEtmk0=
nWwsjsYkVTEOPibGARKeHxl5bnTMplI=
FZ49p8ECLCHhmPWAaeTYSA==
PxjG5EeL6XNB1g==
4WsBX6cCMg6hxu1TFGNI
fj4IV2Kw4sRGb5OuQnbUWpalEsbKJ1o=
9APMETJ6ppJD1gIoIGMDUXnl
HdRquMEPOhbj2ewevw==
BdiC4xZxmoIXPl1xUJwr8UWCa3TMplI=
exLLJ0KHxKEkKAxcNsFj4R9sWw==
ydKJ1SSC6XNB1g==
nnoyh9I0QCa107xgARcqXw==
8QCwFyl7s5EO2ewevw==
s3waX6YHZPO7Tmv0fL1OqyRXLlluLg==
USC3IFO8871JETXBa/U=
UxbBGjVqrIZA6FnqfL5KkYs=
WxrbI13Y+eCp9e0K2yR2wCVnUw==
e4onfccrXkQSVm/qLEC+VFeRbnTMplI=
4t2Gz+MySyf1RcPUqA==
MdaT9DdMa0bZ+wNTFGNI
LXj8J8noEus=
EuKs+zaszqgyWF3aRb4fbZalEsbKJ1o=
oqZjr8QDRCGhyuxTFGNI
zZ5Vn7X4N9blLB0=
z4gWW4LD8duvVL1f7fuG/HPj
iYgcjMgrPNWwvcXrntX2snm8HZypxgDF
M/Ps/x9enn46wuxTFGNI
WzrTM3bgEeNztedTFGNI
q2D1SXPc/dtjp/0p+EGcFhyD+nTMplI=
pmUkbq4RMPF7fmPpH18DUXnl
7e+e+gBDnTK36AQ=
LQak8gpGdEHh/wNTFGNI
YyDKFjh5lnM4ID8hcPE=
SCraRlqxyaFiUnmg
Uye1FT+42bVEebnFkK6M3iOHbHTMplI=
Acd0xd85VObjGFS25exEEIM=
BZE0SPLpVjy7
AtR73OwIe2E8cpY3hzwednfIpbV6k+O9fA==
woItf6YTRi/tRcPUqA==
dT/vTYv0H9+4UH+apjMDUXnl
WFwXe4ngC+d+sNBgARcqXw==
7KpDjaz4OBnng7xX4SrGDfcCLFo=
xJQ7iabxCPTJfNZTFGNI
lascypaaadvisory.org
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ORDER NO VOL- 6542 335 22.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 552 set thread context of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 1976 set thread context of 3452 1976 ORDER NO VOL- 6542 335 22.exe 56 PID 1976 set thread context of 3452 1976 ORDER NO VOL- 6542 335 22.exe 56 PID 1092 set thread context of 3452 1092 help.exe 56 -
Program crash 1 IoCs
pid pid_target Process procid_target 1824 552 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER NO VOL- 6542 335 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDER NO VOL- 6542 335 22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 552 ORDER NO VOL- 6542 335 22.exe 552 ORDER NO VOL- 6542 335 22.exe 552 ORDER NO VOL- 6542 335 22.exe 552 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1976 ORDER NO VOL- 6542 335 22.exe 1092 help.exe 1092 help.exe 1092 help.exe 1092 help.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 552 ORDER NO VOL- 6542 335 22.exe Token: SeDebugPrivilege 1976 ORDER NO VOL- 6542 335 22.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeDebugPrivilege 1092 help.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 552 wrote to memory of 924 552 ORDER NO VOL- 6542 335 22.exe 100 PID 552 wrote to memory of 924 552 ORDER NO VOL- 6542 335 22.exe 100 PID 552 wrote to memory of 924 552 ORDER NO VOL- 6542 335 22.exe 100 PID 552 wrote to memory of 4512 552 ORDER NO VOL- 6542 335 22.exe 101 PID 552 wrote to memory of 4512 552 ORDER NO VOL- 6542 335 22.exe 101 PID 552 wrote to memory of 4512 552 ORDER NO VOL- 6542 335 22.exe 101 PID 552 wrote to memory of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 552 wrote to memory of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 552 wrote to memory of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 552 wrote to memory of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 552 wrote to memory of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 552 wrote to memory of 1976 552 ORDER NO VOL- 6542 335 22.exe 102 PID 1976 wrote to memory of 1092 1976 ORDER NO VOL- 6542 335 22.exe 107 PID 1976 wrote to memory of 1092 1976 ORDER NO VOL- 6542 335 22.exe 107 PID 1976 wrote to memory of 1092 1976 ORDER NO VOL- 6542 335 22.exe 107 PID 1092 wrote to memory of 4900 1092 help.exe 108 PID 1092 wrote to memory of 4900 1092 help.exe 108 PID 1092 wrote to memory of 4900 1092 help.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"3⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"3⤵PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"C:\Users\Admin\AppData\Local\Temp\ORDER NO VOL- 6542 335 22.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵PID:4900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 12843⤵
- Program crash
PID:1824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 552 -ip 5521⤵PID:4232