Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/12/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
6b5e67fc066baf47b9a4cf5d5ece9015982cd5d4f0b843caaf3435fca979e6e3.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b5e67fc066baf47b9a4cf5d5ece9015982cd5d4f0b843caaf3435fca979e6e3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
ORDEN DE COMPRA .pdF.exe
Resource
win7-20240708-en
General
-
Target
ORDEN DE COMPRA .pdF.exe
-
Size
913KB
-
MD5
5f3bb9b37ca94a6d7ac4251b311f3411
-
SHA1
125ebf52ebcee4dfcd2225a3ee79b4e91a835cb2
-
SHA256
eb9a61f2196306679a282ab81f0f8a480a5c57aedeb20886d122fe044556eb87
-
SHA512
37c22de1774db86d49c0fe86da7a4ae0496c20749b82870df433e8e3f7e4ecbc14e73bbc9ed2cf7d6ee33ed16a88453c1e23788b056087a5267c136541ca0ed6
-
SSDEEP
12288:/RV/+MaZ03sgX5kZqDVfldxoSdWN5+H8HJzk5DtEJ2u:p9+UdkZqDVzxhMUH8pyb
Malware Config
Extracted
formbook
4.1
de19
predictivemedicine.life
coloringforthepeople.com
project154.com
usmmexchange.com
bootzxon.com
chaoge730.com
thenaci.com
moviestarplent.com
musicallyengaged.com
sneakerspark.net
yudist.com
apqrcx.xyz
traceless.tel
guardlanavionics.com
usadogrights.com
openei.club
aventusluxury.com
telewebin.com
godrej-threeparks.net
solbysol.com
tarahomesolutions.com
riaairlines.com
berrygooddesigns.com
assistance-bouygues-telecom.com
s4hbgroupds.com
lago-vista-ata-martial-arts.com
icishopping.com
itkonsult.online
knightsbridgecdd.com
wrightstowntigers.com
gzxsb.com
teenanxiety.co
shanepisko.com
fftblogs.com
br-cleaning.plus
miami1688.cool
necomw.com
americanfreightsystemsinc.com
veirdmusic.com
brandnicer.com
ones77motiving.com
stephensthebakers.com
thaicomfortfood.com
mooreandsonsak.net
19838888.com
hay-yusspd-osaka-japan.life
junaidsubhani.tech
cadengineer.co.uk
camaratechsevilla.com
scholarsinfoguide.com
listcord.net
bossyoushu.com
robertkslaughter.xyz
locallywhitstable.co.uk
rsbtileinc.com
eviexo.com
lung-cancer-treatment-43816.com
lizandpeter.com
iberiahomes.institute
buyeber.net
hanarsedivy.com
fielsp.online
kuav7.com
1classlawncare.com
lanyuelou.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral3/memory/2544-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral3/memory/3000-26-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2440 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2288 set thread context of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2544 set thread context of 1228 2544 RegSvcs.exe 21 PID 3000 set thread context of 1228 3000 explorer.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORDEN DE COMPRA .pdF.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2288 ORDEN DE COMPRA .pdF.exe 2288 ORDEN DE COMPRA .pdF.exe 2288 ORDEN DE COMPRA .pdF.exe 2288 ORDEN DE COMPRA .pdF.exe 2288 ORDEN DE COMPRA .pdF.exe 2288 ORDEN DE COMPRA .pdF.exe 2544 RegSvcs.exe 2544 RegSvcs.exe 2440 powershell.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe 3000 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2544 RegSvcs.exe 2544 RegSvcs.exe 2544 RegSvcs.exe 3000 explorer.exe 3000 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2288 ORDEN DE COMPRA .pdF.exe Token: SeDebugPrivilege 2544 RegSvcs.exe Token: SeDebugPrivilege 2440 powershell.exe Token: SeDebugPrivilege 3000 explorer.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2440 2288 ORDEN DE COMPRA .pdF.exe 31 PID 2288 wrote to memory of 2440 2288 ORDEN DE COMPRA .pdF.exe 31 PID 2288 wrote to memory of 2440 2288 ORDEN DE COMPRA .pdF.exe 31 PID 2288 wrote to memory of 2440 2288 ORDEN DE COMPRA .pdF.exe 31 PID 2288 wrote to memory of 2876 2288 ORDEN DE COMPRA .pdF.exe 33 PID 2288 wrote to memory of 2876 2288 ORDEN DE COMPRA .pdF.exe 33 PID 2288 wrote to memory of 2876 2288 ORDEN DE COMPRA .pdF.exe 33 PID 2288 wrote to memory of 2876 2288 ORDEN DE COMPRA .pdF.exe 33 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2720 2288 ORDEN DE COMPRA .pdF.exe 35 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2808 2288 ORDEN DE COMPRA .pdF.exe 36 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 2288 wrote to memory of 2544 2288 ORDEN DE COMPRA .pdF.exe 37 PID 1228 wrote to memory of 3000 1228 Explorer.EXE 38 PID 1228 wrote to memory of 3000 1228 Explorer.EXE 38 PID 1228 wrote to memory of 3000 1228 Explorer.EXE 38 PID 1228 wrote to memory of 3000 1228 Explorer.EXE 38 PID 3000 wrote to memory of 964 3000 explorer.exe 39 PID 3000 wrote to memory of 964 3000 explorer.exe 39 PID 3000 wrote to memory of 964 3000 explorer.exe 39 PID 3000 wrote to memory of 964 3000 explorer.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\ORDEN DE COMPRA .pdF.exe"C:\Users\Admin\AppData\Local\Temp\ORDEN DE COMPRA .pdF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vorOrB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vorOrB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp98B7.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD586f47103dcef272266c01f70edb520de
SHA18c3a22f0d9a803e983bbe043d5f8b0bdc898b5a2
SHA256ba820dd626a3f2887cab07eed3eb96d3f75d45a0853e952ea7773b395e9c9dfb
SHA5128019b85645d326a0d7c8e6285c8d4f7e9c6dabec88e5e5562337fe6d77d84c3b99e10db2394944a64bcd418a373974682700666463dfd4393a1e02a67704f972