Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2024, 08:26 UTC

General

  • Target

    Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe

  • Size

    841KB

  • MD5

    42d33f1103e99970b5a2bd66cc7abacf

  • SHA1

    18b40de46605a148bd005f07f1396ea4be30f962

  • SHA256

    898019809aff31148304abc19ab0514838d5ed4ae75318fe8865b4e5b139d52f

  • SHA512

    471ef7e285ae5bb0db67e6722dde3877180d980f1cef271bf81e8c1f8c3fbd26ffa435eb04b0ef14ae6898ac26ed8b235eb9b203947aa4020955e5989e22fbbc

  • SSDEEP

    12288:Duup9hCcfZ/2Yp45XWCPrpLlafo3arpcYVx1Izq+lG/hS2zG9+aw9cNq0p2W:qrk/2Yp4JWKmhpcewu+lghjZqN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wk31

Decoy

soroban.xyz

irfirstaid.com

irsaycollection.com

thebardownstairsasheville.com

facebookmeta.business

paypalsupportclient.com

metaversusfacebook.com

litakparuikamazon.com

rivianmotorcompany.com

metaversepro.us

ikramfamilypractice.com

bitcoinfuturesetfs.online

5donline.com

rosemount.us

nicole-steinfort.com

performanceautorepairsj.com

scrabblecheats.us

kjg67amazon.com

formerlyknownasfacebook.com

youtubeandgooglepay.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe
      "C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe
        "C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe"
        3⤵
          PID:2724
        • C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe
          "C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2668
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Estimates (Korea Zinc Co., Ltd. Onsan Refinery) 275-016.exe"
          3⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:1296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1188-18-0x0000000004050000-0x0000000004250000-memory.dmp

      Filesize

      2.0MB

    • memory/1188-30-0x00000000051D0000-0x0000000005370000-memory.dmp

      Filesize

      1.6MB

    • memory/1188-25-0x0000000004330000-0x0000000004400000-memory.dmp

      Filesize

      832KB

    • memory/1188-24-0x00000000051D0000-0x0000000005370000-memory.dmp

      Filesize

      1.6MB

    • memory/1188-23-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1188-19-0x0000000004330000-0x0000000004400000-memory.dmp

      Filesize

      832KB

    • memory/2648-6-0x0000000000F60000-0x0000000000FBC000-memory.dmp

      Filesize

      368KB

    • memory/2648-5-0x0000000073F10000-0x00000000745FE000-memory.dmp

      Filesize

      6.9MB

    • memory/2648-1-0x0000000001230000-0x0000000001308000-memory.dmp

      Filesize

      864KB

    • memory/2648-2-0x0000000073F10000-0x00000000745FE000-memory.dmp

      Filesize

      6.9MB

    • memory/2648-3-0x0000000000390000-0x000000000039C000-memory.dmp

      Filesize

      48KB

    • memory/2648-4-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

      Filesize

      4KB

    • memory/2648-13-0x0000000073F10000-0x00000000745FE000-memory.dmp

      Filesize

      6.9MB

    • memory/2648-7-0x0000000004CC0000-0x0000000004CF6000-memory.dmp

      Filesize

      216KB

    • memory/2648-0-0x0000000073F1E000-0x0000000073F1F000-memory.dmp

      Filesize

      4KB

    • memory/2668-17-0x00000000001C0000-0x00000000001D5000-memory.dmp

      Filesize

      84KB

    • memory/2668-16-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2668-14-0x0000000000AE0000-0x0000000000DE3000-memory.dmp

      Filesize

      3.0MB

    • memory/2668-8-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2668-22-0x0000000000430000-0x0000000000445000-memory.dmp

      Filesize

      84KB

    • memory/2668-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2668-21-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2668-12-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2668-9-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2984-26-0x0000000000EB0000-0x0000000000EBD000-memory.dmp

      Filesize

      52KB

    • memory/2984-28-0x0000000000EB0000-0x0000000000EBD000-memory.dmp

      Filesize

      52KB

    • memory/2984-29-0x00000000000D0000-0x00000000000FF000-memory.dmp

      Filesize

      188KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.