Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2024, 07:07 UTC

General

  • Target

    0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe

  • Size

    409KB

  • MD5

    d7fd44db6ff7913a79d60eae65422594

  • SHA1

    00bdf1e46cb1c7a9f0c2d2b354482213517f2c18

  • SHA256

    0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71

  • SHA512

    b18ffc00c0b5c3e07554d846aa6ed3c99913f81fee441c09db54f77ec717a4161bc447d47780d6a16558f0e96757b1c5e98298dd994ca2ac4ed5531713114fa7

  • SSDEEP

    6144:IzvmRaG/aq0YEYBJ6gjiOFuBt5a9LwNCKFYc/z3EHEle70IEU0rq/UiAY:IicGX0YHJ6gOp+LmCmz3EH1Ft/Uil

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dv9n

Decoy

nblvqing.com

delmegebuildingproducts.com

xiongba8.com

latuawebreputation.online

nowcloud.tech

cckghs.com

tradeoo.ltd

ppapo.com

tphoaphuongdo.club

whitefoxy.site

bottle-sentences.net

computersewa.com

lushberryholidays.com

motobotz.com

shadurj.com

amazonlexdeveloper.com

shunli178.xyz

sjzzlmh.com

6eu09rp.xyz

novinmes.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe
      "C:\Users\Admin\AppData\Local\Temp\0791e8ab1ff5119cb4dedba8cbd260f6a163100eb60657cad11f494cb34bbc71.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dvlGnUp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3ACF.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2844
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2804
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:2652
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:2764
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\SysWOW64\netsh.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2296

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1192-31-0x0000000005140000-0x00000000052A8000-memory.dmp

        Filesize

        1.4MB

      • memory/1192-26-0x0000000005140000-0x00000000052A8000-memory.dmp

        Filesize

        1.4MB

      • memory/1192-22-0x0000000004FA0000-0x0000000005134000-memory.dmp

        Filesize

        1.6MB

      • memory/1192-27-0x0000000004FA0000-0x0000000005134000-memory.dmp

        Filesize

        1.6MB

      • memory/2248-29-0x0000000000B00000-0x0000000000B1B000-memory.dmp

        Filesize

        108KB

      • memory/2248-30-0x0000000000080000-0x00000000000AF000-memory.dmp

        Filesize

        188KB

      • memory/2248-28-0x0000000000B00000-0x0000000000B1B000-memory.dmp

        Filesize

        108KB

      • memory/2504-5-0x00000000012A0000-0x00000000012F8000-memory.dmp

        Filesize

        352KB

      • memory/2504-4-0x0000000074E80000-0x000000007556E000-memory.dmp

        Filesize

        6.9MB

      • memory/2504-19-0x0000000074E80000-0x000000007556E000-memory.dmp

        Filesize

        6.9MB

      • memory/2504-0-0x0000000074E8E000-0x0000000074E8F000-memory.dmp

        Filesize

        4KB

      • memory/2504-3-0x00000000004C0000-0x00000000004CE000-memory.dmp

        Filesize

        56KB

      • memory/2504-2-0x0000000074E80000-0x000000007556E000-memory.dmp

        Filesize

        6.9MB

      • memory/2504-1-0x0000000001360000-0x00000000013CC000-memory.dmp

        Filesize

        432KB

      • memory/2804-17-0x00000000008F0000-0x0000000000BF3000-memory.dmp

        Filesize

        3.0MB

      • memory/2804-24-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2804-25-0x00000000002E0000-0x00000000002F4000-memory.dmp

        Filesize

        80KB

      • memory/2804-20-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2804-21-0x00000000002A0000-0x00000000002B4000-memory.dmp

        Filesize

        80KB

      • memory/2804-12-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2804-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2804-16-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2804-11-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.