Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2024, 00:25 UTC

General

  • Target

    d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe

  • Size

    935KB

  • MD5

    f5f3e2cde43a70def7697aafd955cfc3

  • SHA1

    da7c220e7974b04b057fcdc7a5708a77b31e716e

  • SHA256

    d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0

  • SHA512

    8cb11c45fb7bec41638c55dface7188b9f647d77efe56e5791cf620c83c116cc93c408c46ee7ee3c3d48de272fb7e8dba601093cce83ef29f00ec901ebb16aa4

  • SSDEEP

    12288:Ymele2oYC/0yzySje4oPVM3z0rcW0VOdpMLJ7szoUARCif+oqui:YS2oYY0cLVCVM7oMLlss7Cif+oqX

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

rsea

Decoy

aylagrey.com

ketoodavoqslim.xyz

foyfoy.ltd

buymistnow.com

ownempire.net

cie-revolver.com

kedaimks.com

rockbettergear.com

luminousfadel.com

universalbumpkeys.com

enjoyablestopnshop.com

grandesfinanzas.com

professionmessaging.com

thtoughthenight.com

conservativesshop.com

jimihoodie.com

nhlove.net

agentsheila.com

tilemarkng.com

94ei6mgy.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe
    "C:\Users\Admin\AppData\Local\Temp\d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2328-6-0x0000000004E50000-0x0000000004ED6000-memory.dmp

    Filesize

    536KB

  • memory/2328-15-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/2328-2-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/2328-3-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB

  • memory/2328-4-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/2328-5-0x0000000074A80000-0x000000007516E000-memory.dmp

    Filesize

    6.9MB

  • memory/2328-7-0x0000000000580000-0x00000000005B4000-memory.dmp

    Filesize

    208KB

  • memory/2328-0-0x0000000074A8E000-0x0000000074A8F000-memory.dmp

    Filesize

    4KB

  • memory/2328-1-0x0000000000040000-0x000000000012E000-memory.dmp

    Filesize

    952KB

  • memory/2624-10-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2624-14-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2624-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2624-8-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2624-16-0x0000000000B00000-0x0000000000E03000-memory.dmp

    Filesize

    3.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.