Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
Bankcerticate223pdf.exe
Resource
win7-20240903-en
General
-
Target
Bankcerticate223pdf.exe
-
Size
819KB
-
MD5
05bf21401fdd83ba54d1ad55f909e590
-
SHA1
47efbfdfcfe6a39499d1bd5bf0fe2a27ade6c0ff
-
SHA256
efd65e32b20afe5bd0541a097bb5f4e7f741875b2c65cab7f08c04a645ccdf6f
-
SHA512
99fab03cb018c20e2f647c318db6861798165891d2641f2dcb8fbc9e2bbe27eb6e1200bda8f6f1e92a97b4ca2c4c31f4c158ea82cd7ca755363932b9bd83b654
-
SSDEEP
12288:zpX2dGTyWXV7O7L5BDEYQfWusPTPzcbGfiwP+SepsWGrvGAGT:92MxO7JzcbGqwZepdGW
Malware Config
Extracted
formbook
4.1
a02d
coplus.market
oofing-jobs-74429.bond
healchemists.xyz
oofcarpenternearme-jp.xyz
enewebsolutions.online
harepoint.legal
88977.club
omptables.xyz
eat-pumps-31610.bond
endown.graphics
amsexgirls.website
ovevibes.xyz
u-thiensu.online
yblinds.xyz
rumpchiefofstaff.store
erzog.fun
rrm.lat
agiclime.pro
agaviet59.shop
lbdoanhnhan.net
irvasenitpalvelut.online
strange.store
bsidiansurvival.shop
lown.bond
irrorbd.online
idzev.shop
tyleyourvibe.shop
qweemaildwqfewew.live
sychology-degree-92767.bond
orklift-jobs-76114.bond
nytymeoccassions.store
nfluencer-marketing-41832.bond
rh799295w.vip
066661a23.buzz
m235a.net
omestur.online
nalyzator.fun
itchen-remodeling-41686.bond
ontenbully.shop
oratrading.best
tiwebu.info
lueticks.shop
ocubox.xyz
q33.lat
earch-solar-installer-top.today
ceqne.vip
8betpragmatic.store
oftware-download-37623.bond
oofing-jobs-29700.bond
vorachem.xyz
ruck-driver-jobs-58337.bond
om-exchange-nft370213.sbs
jfghnxnvdfgh.icu
inhngoc.webcam
ruck-driver-jobs-86708.bond
oftware-engineering-27699.bond
nfoyl.xyz
estionprojetsccpm.online
reativesos.studio
ammamiaitalia.net
4cw.lat
oofighters.xyz
ukusindo4dpools.net
yhbvc.xyz
8435.pizza
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2824-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2708-28-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2200 powershell.exe 1292 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1768 set thread context of 2824 1768 Bankcerticate223pdf.exe 37 PID 2824 set thread context of 1188 2824 RegSvcs.exe 21 PID 2708 set thread context of 1188 2708 control.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bankcerticate223pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1768 Bankcerticate223pdf.exe 1768 Bankcerticate223pdf.exe 2824 RegSvcs.exe 2824 RegSvcs.exe 2200 powershell.exe 1292 powershell.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe 2708 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2824 RegSvcs.exe 2824 RegSvcs.exe 2824 RegSvcs.exe 2708 control.exe 2708 control.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1768 Bankcerticate223pdf.exe Token: SeDebugPrivilege 2824 RegSvcs.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 2708 control.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2200 1768 Bankcerticate223pdf.exe 31 PID 1768 wrote to memory of 2200 1768 Bankcerticate223pdf.exe 31 PID 1768 wrote to memory of 2200 1768 Bankcerticate223pdf.exe 31 PID 1768 wrote to memory of 2200 1768 Bankcerticate223pdf.exe 31 PID 1768 wrote to memory of 1292 1768 Bankcerticate223pdf.exe 33 PID 1768 wrote to memory of 1292 1768 Bankcerticate223pdf.exe 33 PID 1768 wrote to memory of 1292 1768 Bankcerticate223pdf.exe 33 PID 1768 wrote to memory of 1292 1768 Bankcerticate223pdf.exe 33 PID 1768 wrote to memory of 2196 1768 Bankcerticate223pdf.exe 34 PID 1768 wrote to memory of 2196 1768 Bankcerticate223pdf.exe 34 PID 1768 wrote to memory of 2196 1768 Bankcerticate223pdf.exe 34 PID 1768 wrote to memory of 2196 1768 Bankcerticate223pdf.exe 34 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1768 wrote to memory of 2824 1768 Bankcerticate223pdf.exe 37 PID 1188 wrote to memory of 2708 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2708 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2708 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2708 1188 Explorer.EXE 38 PID 2708 wrote to memory of 660 2708 control.exe 39 PID 2708 wrote to memory of 660 2708 control.exe 39 PID 2708 wrote to memory of 660 2708 control.exe 39 PID 2708 wrote to memory of 660 2708 control.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Bankcerticate223pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bankcerticate223pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Bankcerticate223pdf.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\cvRSCwXQ.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cvRSCwXQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1A25.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2196
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5445ae7f75744ba9123abfde2ee8177cf
SHA1e47b90741bd7f6770cee6523eba3c05f3a83419f
SHA2565580d75f9da6c276c66aacb8ee16730dc713397ea4e79bf2e47660be45dbb711
SHA512d40803026e2f80105ce662768aa3ff326e1bcd2dc8cb415a5a586817c21193f757cb967d6f68be63496f1422138ee63be95524605459f6212bab766af015fe78
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BSR8XJK0LW1PO8QQ35C6.temp
Filesize7KB
MD5363780126d82c90527a166312ba4a48e
SHA1753234426c153ecb2c1ef142dbcae8c917025429
SHA256051d77fe78560148ae5f6b08bca35bf69977f82a7bfaeefa4eda23d8759e7df0
SHA5128cef50c27cd117b5b68bafa85879361f66888f5189bb67a1d379d6f815dee3d1a6f51f910f0b14b578e67d3f12d55bdca764d85f57e7d7e4a228cef4798d7476