Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe
Resource
win7-20240903-en
General
-
Target
339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe
-
Size
742KB
-
MD5
318b9fba04abf5010446161aed881cc2
-
SHA1
996a0ddc988e5f64537c37c68646efb2d8dacc4c
-
SHA256
339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97
-
SHA512
b84ecef8d7eab0b4c21520046fb92a242f23e9069480482b81871f327a5173adbbc0cdd2ba2ede1ec3ecdb33d477c7f5c978d00d2c2bf05abd89cb04081af9c6
-
SSDEEP
12288:VQoJNhQ/cWS7stsLbolyisOq+BGJpqp5VKr6FAr0trGsVagoW:V3JN+UVsa/olrBGCDVa6FAqrGWe
Malware Config
Extracted
formbook
4.1
a02d
coplus.market
oofing-jobs-74429.bond
healchemists.xyz
oofcarpenternearme-jp.xyz
enewebsolutions.online
harepoint.legal
88977.club
omptables.xyz
eat-pumps-31610.bond
endown.graphics
amsexgirls.website
ovevibes.xyz
u-thiensu.online
yblinds.xyz
rumpchiefofstaff.store
erzog.fun
rrm.lat
agiclime.pro
agaviet59.shop
lbdoanhnhan.net
irvasenitpalvelut.online
strange.store
bsidiansurvival.shop
lown.bond
irrorbd.online
idzev.shop
tyleyourvibe.shop
qweemaildwqfewew.live
sychology-degree-92767.bond
orklift-jobs-76114.bond
nytymeoccassions.store
nfluencer-marketing-41832.bond
rh799295w.vip
066661a23.buzz
m235a.net
omestur.online
nalyzator.fun
itchen-remodeling-41686.bond
ontenbully.shop
oratrading.best
tiwebu.info
lueticks.shop
ocubox.xyz
q33.lat
earch-solar-installer-top.today
ceqne.vip
8betpragmatic.store
oftware-download-37623.bond
oofing-jobs-29700.bond
vorachem.xyz
ruck-driver-jobs-58337.bond
om-exchange-nft370213.sbs
jfghnxnvdfgh.icu
inhngoc.webcam
ruck-driver-jobs-86708.bond
oftware-engineering-27699.bond
nfoyl.xyz
estionprojetsccpm.online
reativesos.studio
ammamiaitalia.net
4cw.lat
oofighters.xyz
ukusindo4dpools.net
yhbvc.xyz
8435.pizza
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2652-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2636-29-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2260 powershell.exe 2804 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1956 set thread context of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 2652 set thread context of 1200 2652 RegSvcs.exe 21 PID 2636 set thread context of 1200 2636 cmmon32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 2260 powershell.exe 2804 powershell.exe 2652 RegSvcs.exe 2652 RegSvcs.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe 2636 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2652 RegSvcs.exe 2652 RegSvcs.exe 2652 RegSvcs.exe 2636 cmmon32.exe 2636 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 2652 RegSvcs.exe Token: SeDebugPrivilege 2636 cmmon32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2804 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 31 PID 1956 wrote to memory of 2804 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 31 PID 1956 wrote to memory of 2804 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 31 PID 1956 wrote to memory of 2804 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 31 PID 1956 wrote to memory of 2260 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 33 PID 1956 wrote to memory of 2260 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 33 PID 1956 wrote to memory of 2260 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 33 PID 1956 wrote to memory of 2260 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 33 PID 1956 wrote to memory of 2832 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 35 PID 1956 wrote to memory of 2832 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 35 PID 1956 wrote to memory of 2832 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 35 PID 1956 wrote to memory of 2832 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 35 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1956 wrote to memory of 2652 1956 339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe 37 PID 1200 wrote to memory of 2636 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2636 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2636 1200 Explorer.EXE 38 PID 1200 wrote to memory of 2636 1200 Explorer.EXE 38 PID 2636 wrote to memory of 2212 2636 cmmon32.exe 39 PID 2636 wrote to memory of 2212 2636 cmmon32.exe 39 PID 2636 wrote to memory of 2212 2636 cmmon32.exe 39 PID 2636 wrote to memory of 2212 2636 cmmon32.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe"C:\Users\Admin\AppData\Local\Temp\339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\339c521fe6235de8b0b912c9fffcad6cc2eab721902ac095bafa510d68868c97.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iWxVkVDQYvd.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iWxVkVDQYvd" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFAC3.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f288207bbb00ddd4d4e28cb70461ceb6
SHA15f812b04d7f56bef4bdbc5c0255175797bef080e
SHA256abfdff477a988a1571406b3f45e3bf84c74dbf30e15aa4f009857e59966ffb5a
SHA5122b08a8a01fe333480158d74f4ab9e9d42c8e5e85bc2230fafd3b18055d18f70d94eab8f379dc4839725a302bdd861622995a39a226466d1144191e7ce0d890e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58c73494abe22386dc840b5ce9db61021
SHA1109f9931390f7b1392340f3a549ddae8df0d59eb
SHA25621d3cf4ec064e9c239b6a41feab068869b27127348954961427a7b27fd3de7f8
SHA5127e9d3c533928e280bd97ca150e7b46a9f1f75f77761221c574f4fa55d74085464515d9266c1ebf3ad7469de86ccf30462ff4bc7e35a0c3a14d980e147d8a94e6