Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/01/2025, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
New purchase order.exe
Resource
win7-20240903-en
General
-
Target
New purchase order.exe
-
Size
650KB
-
MD5
1b507df9a13477b647da450a1b79b2e7
-
SHA1
b0de85855b3462fe0b37c79831b391eeb044e437
-
SHA256
a3af3dcfd89b655982b6e044b681b140dcefbe0606d69b0b7839b8cda28ccc91
-
SHA512
37dcc8dd92a84009f81ebf394001de49bcf75818227bdbe135578f8f1dc57f4119c4cb6efd91ec70fe12202854ca472ec7435d3c0f713bf770f09967d61fe6a7
-
SSDEEP
12288:kYRxA4Y5lyA/BxSPC3NMl2v/wXb5DDH6dcW6f8HtdJqT6B2zJxWVqHU:bRB2XM5UN60STUAJE
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2156-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2536-27-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2704 powershell.exe 2772 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2116 set thread context of 2156 2116 New purchase order.exe 36 PID 2156 set thread context of 1184 2156 MSBuild.exe 21 PID 2536 set thread context of 1184 2536 colorcpl.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2116 New purchase order.exe 2116 New purchase order.exe 2156 MSBuild.exe 2156 MSBuild.exe 2772 powershell.exe 2704 powershell.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe 2536 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2156 MSBuild.exe 2156 MSBuild.exe 2156 MSBuild.exe 2536 colorcpl.exe 2536 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2116 New purchase order.exe Token: SeDebugPrivilege 2156 MSBuild.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2536 colorcpl.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2704 2116 New purchase order.exe 30 PID 2116 wrote to memory of 2704 2116 New purchase order.exe 30 PID 2116 wrote to memory of 2704 2116 New purchase order.exe 30 PID 2116 wrote to memory of 2704 2116 New purchase order.exe 30 PID 2116 wrote to memory of 2772 2116 New purchase order.exe 32 PID 2116 wrote to memory of 2772 2116 New purchase order.exe 32 PID 2116 wrote to memory of 2772 2116 New purchase order.exe 32 PID 2116 wrote to memory of 2772 2116 New purchase order.exe 32 PID 2116 wrote to memory of 2828 2116 New purchase order.exe 34 PID 2116 wrote to memory of 2828 2116 New purchase order.exe 34 PID 2116 wrote to memory of 2828 2116 New purchase order.exe 34 PID 2116 wrote to memory of 2828 2116 New purchase order.exe 34 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 2116 wrote to memory of 2156 2116 New purchase order.exe 36 PID 1184 wrote to memory of 2536 1184 Explorer.EXE 37 PID 1184 wrote to memory of 2536 1184 Explorer.EXE 37 PID 1184 wrote to memory of 2536 1184 Explorer.EXE 37 PID 1184 wrote to memory of 2536 1184 Explorer.EXE 37 PID 2536 wrote to memory of 372 2536 colorcpl.exe 38 PID 2536 wrote to memory of 372 2536 colorcpl.exe 38 PID 2536 wrote to memory of 372 2536 colorcpl.exe 38 PID 2536 wrote to memory of 372 2536 colorcpl.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\New purchase order.exe"C:\Users\Admin\AppData\Local\Temp\New purchase order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New purchase order.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\DjsaCPLWOz.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DjsaCPLWOz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp50A0.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5df9d0061b95bfd9bdc142299d827baaf
SHA15c41fa19af077cfc90fa9dc900b6fa107c59c3af
SHA2564f57e77d77381effcff4321b1baa4122bf447e00b989617adf078c5eb7b288a5
SHA5129a12c4fb772c1a002cede6b7f3799b6b4b04199b001e7f1315f938d34ccb43c39f418124eef9d4048dcc9e8e27ecfa4567512c7e157533a65b5e5241cc7a67ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ae836f2ea48b9165590fc55fd199caa0
SHA10d542917a4b570e869426c985086e2bd44b92da3
SHA256ed18ccff79dc9bb634aad4ce9eb4500c17df2cfead3d1cae51ab89ccfcba8fc0
SHA512ce9e8c05d2c23f1f3dc20a54073421f4c634384981f4945e9ece5949820719f09727baf598c0d5592c9246dd93dda893b29ccbd261b2127130a94c01dbc85ea8