Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2024, 22:36

General

  • Target

    be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe

  • Size

    775KB

  • MD5

    94c1e957b1e28c57ef9ce07ccc914a32

  • SHA1

    1aeec2fa9616e7751c83e788faa3e8af83ba059c

  • SHA256

    be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78

  • SHA512

    7cad46367a0e2fb7a3261804d283e6d33f2a45b60b10a4c16562bd1b1a29f894b2ef65fad3d355fedbd590042c5202713518cb46496655c305231083d8caa6a8

  • SSDEEP

    12288:B2iN3M/CcdMo5E72KRgm9nnmzbjkcgIvr39oo3F5/W+:B1CaN72KRgmRmjkU3io3F93

Malware Config

Extracted

Family

formbook

Campaign

g44n

Decoy

t60gB4YRvsDLttd9HG4=

xck8G7COQ+g7VIpX

BQQF3mmpLPskhQ==

eLWwmzNyK6ee+nF1jDvvkxuSGA==

3tlgNOzw8BBjpNOQMnc=

nOpNEJhoU0h+00S9E1YfgA==

xcvTpljkjIyEdvhp+VcGFtJC

bZxOHr5CtzY4

rOD304X0u1DN/m7cbA==

Knixl0HJyEOOiNckwk8GFtJC

S4JMDRNTUAol

Vp9wSwNZSfY7VIpX

0Nf/zlrpmpahnM+tpkYGFtJC

joXsuHiBcVp88DHEHMA7

yN8i9ppoZYHSSaqqk6NZnQ==

4UFEMfyKhSB4UovzjdabqolwhFtMH1M=

d3RiRcXCeR8wlgjEHMA7

eMUS8PSBPCe2rPg=

LCsR0X328UuSAmlf

/keifSXopayqjLt1EWQ=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe
    "C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe
      "C:\Users\Admin\AppData\Local\Temp\be295268162c4bde1f31e9413a87f903a419bf743cdbee69db925162c21b7d78.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1580-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1580-19-0x0000000001230000-0x000000000157A000-memory.dmp

    Filesize

    3.3MB

  • memory/1580-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1580-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2456-8-0x00000000752C0000-0x0000000075A70000-memory.dmp

    Filesize

    7.7MB

  • memory/2456-11-0x0000000007CE0000-0x0000000007D7C000-memory.dmp

    Filesize

    624KB

  • memory/2456-6-0x0000000005820000-0x0000000005838000-memory.dmp

    Filesize

    96KB

  • memory/2456-7-0x00000000752CE000-0x00000000752CF000-memory.dmp

    Filesize

    4KB

  • memory/2456-0-0x00000000752CE000-0x00000000752CF000-memory.dmp

    Filesize

    4KB

  • memory/2456-9-0x00000000066E0000-0x00000000066EC000-memory.dmp

    Filesize

    48KB

  • memory/2456-10-0x0000000007BD0000-0x0000000007C40000-memory.dmp

    Filesize

    448KB

  • memory/2456-5-0x00000000052B0000-0x00000000052BA000-memory.dmp

    Filesize

    40KB

  • memory/2456-12-0x0000000007C50000-0x0000000007C86000-memory.dmp

    Filesize

    216KB

  • memory/2456-4-0x00000000752C0000-0x0000000075A70000-memory.dmp

    Filesize

    7.7MB

  • memory/2456-3-0x00000000052D0000-0x0000000005362000-memory.dmp

    Filesize

    584KB

  • memory/2456-2-0x0000000005880000-0x0000000005E24000-memory.dmp

    Filesize

    5.6MB

  • memory/2456-18-0x00000000752C0000-0x0000000075A70000-memory.dmp

    Filesize

    7.7MB

  • memory/2456-1-0x00000000007E0000-0x00000000008A8000-memory.dmp

    Filesize

    800KB