Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2025, 09:49 UTC

General

  • Target

    JaffaCakes118_9bbdfbdfbfc6807ee9bae456d17987c6.exe

  • Size

    539KB

  • MD5

    9bbdfbdfbfc6807ee9bae456d17987c6

  • SHA1

    23bd49f1432429fe862075af73af430d355b881b

  • SHA256

    4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6

  • SHA512

    b6b69f44c9c110de07056babd9b897b0eb97e97d536fc2ce784a61db0f793c514354b5b521b2062582f4f5fd25f49da7adf9ce2b6d297a0ec2de23d094443498

  • SSDEEP

    6144:YriM0yt1y1zw4Mt+KGqOY1Ks7nqOI38wWq/7PkI3mzXnqMMmiXmhDkZPAoYUl:3Mkzc0B1Y17nz083q/DkImn/pDkZodU

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g8ni

Decoy

nickmowat.com

garethjame.biz

colibrilift.com

vulnerabilitylabs.one

neuro-ai-web-ru.website

16mcnaestreetmooneeponds.com

bestofstmaarten.net

meditelier.com

ragnarduke.com

escueladecampo.com

vongtayvn.com

inmemoriamaan.com

yourpeoplemanager.com

r6-gytr.com

agreeablebeauty.com

snpconfirms.com

tribalurq.quest

purafuse.com

cisco-training-course.com

wery.top

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9bbdfbdfbfc6807ee9bae456d17987c6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9bbdfbdfbfc6807ee9bae456d17987c6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zeVezGXu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB4CE.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2764
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9bbdfbdfbfc6807ee9bae456d17987c6.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9bbdfbdfbfc6807ee9bae456d17987c6.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2804-16-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2804-18-0x00000000008D0000-0x0000000000BD3000-memory.dmp

    Filesize

    3.0MB

  • memory/2804-13-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2804-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2804-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2916-3-0x0000000000470000-0x000000000047E000-memory.dmp

    Filesize

    56KB

  • memory/2916-6-0x0000000000890000-0x00000000008E8000-memory.dmp

    Filesize

    352KB

  • memory/2916-5-0x0000000074370000-0x0000000074A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-4-0x000000007437E000-0x000000007437F000-memory.dmp

    Filesize

    4KB

  • memory/2916-0-0x000000007437E000-0x000000007437F000-memory.dmp

    Filesize

    4KB

  • memory/2916-2-0x0000000074370000-0x0000000074A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-17-0x0000000074370000-0x0000000074A5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-1-0x0000000001270000-0x00000000012FE000-memory.dmp

    Filesize

    568KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.