Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 07:07 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe
Resource
win7-20240903-en
General
-
Target
0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe
-
Size
409KB
-
MD5
d7fd44db6ff7913a79d60eae65422594
-
SHA1
00bdf1e46cb1c7a9f0c2d2b354482213517f2c18
-
SHA256
0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71
-
SHA512
b18ffc00c0b5c3e07554d846aa6ed3c99913f81fee441c09db54f77ec717a4161bc447d47780d6a16558f0e96757b1c5e98298dd994ca2ac4ed5531713114fa7
-
SSDEEP
6144:IzvmRaG/aq0YEYBJ6gjiOFuBt5a9LwNCKFYc/z3EHEle70IEU0rq/UiAY:IicGX0YHJ6gOp+LmCmz3EH1Ft/Uil
Malware Config
Extracted
formbook
4.1
dv9n
nblvqing.com
delmegebuildingproducts.com
xiongba8.com
latuawebreputation.online
nowcloud.tech
cckghs.com
tradeoo.ltd
ppapo.com
tphoaphuongdo.club
whitefoxy.site
bottle-sentences.net
computersewa.com
lushberryholidays.com
motobotz.com
shadurj.com
amazonlexdeveloper.com
shunli178.xyz
sjzzlmh.com
6eu09rp.xyz
novinmes.com
elizabethdouglas.net
heathy.xyz
forsmarthings.com
mskstyle-77.store
henhencaol.xyz
palncakeswap.com
osflogistics.com
14rinapo45.com
jordinandaustin.com
natsmartultimatebest.rest
perfectelopements.com
xinsaiou.com
92billion.com
hb4um.com
amneatni.xyz
pirigame.com
93335t.xyz
forwardvalley.com
contacttracingusa.com
americanexpress2214.creditcard
gurume-naruki.com
cdminstructors.com
posetac.online
suzhouyscl.com
bakarusgroup.com
epicureanadventuretours.com
goldengooses-outlet.com
glitchking411.com
8xroe84.xyz
https29dgi.xyz
sweetspendingwholesalersllc.com
bitopvip.com
sheraton-international.com
ajansclubturkey.site
communityskiswap.com
sauna-kuu.com
stephkingspilates.com
rosnewmarkextension.net
100daysofml.com
nexbot.biz
ahhhpop.com
marfalow.com
project-candles.com
topdogiadung.com
elianedefalco.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2804-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2804-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2804-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2248-30-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2504 set thread context of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2804 set thread context of 1192 2804 RegSvcs.exe 21 PID 2804 set thread context of 1192 2804 RegSvcs.exe 21 PID 2248 set thread context of 1192 2248 netsh.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 2804 RegSvcs.exe 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 2804 RegSvcs.exe 2804 RegSvcs.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe 2248 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2804 RegSvcs.exe 2804 RegSvcs.exe 2804 RegSvcs.exe 2804 RegSvcs.exe 2248 netsh.exe 2248 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe Token: SeDebugPrivilege 2804 RegSvcs.exe Token: SeDebugPrivilege 2248 netsh.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2844 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 31 PID 2504 wrote to memory of 2844 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 31 PID 2504 wrote to memory of 2844 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 31 PID 2504 wrote to memory of 2844 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 31 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 2504 wrote to memory of 2804 2504 0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe 33 PID 1192 wrote to memory of 2248 1192 Explorer.EXE 36 PID 1192 wrote to memory of 2248 1192 Explorer.EXE 36 PID 1192 wrote to memory of 2248 1192 Explorer.EXE 36 PID 1192 wrote to memory of 2248 1192 Explorer.EXE 36 PID 2248 wrote to memory of 2296 2248 netsh.exe 37 PID 2248 wrote to memory of 2296 2248 netsh.exe 37 PID 2248 wrote to memory of 2296 2248 netsh.exe 37 PID 2248 wrote to memory of 2296 2248 netsh.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe"C:\Users\Admin\AppData\Local\Temp\0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dvlGnUp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3ACF.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2652
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2764
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-