Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe
Resource
win7-20240903-en
General
-
Target
28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe
-
Size
694KB
-
MD5
3eb2ceb99c3ef6893ace27ea06be4cfa
-
SHA1
c0d1da3207d947f99c1809cf94055adbdde7c3d7
-
SHA256
28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7
-
SHA512
6e9d570a4e5e20a2d0acd3fd4beebc872238e99aec72a747b3aec809c46f4a26dd651d39be69026f4d061a66d515e131ae830e663104d688fb0841f2b4fe4158
-
SSDEEP
12288:eQFtq5Aai1/mnTesWGrzVXxBEgqO/kCerVYuVH3Uv2Hd9:eMq5Aai10mMzJkjxD2sd9
Malware Config
Extracted
formbook
4.1
a02d
coplus.market
oofing-jobs-74429.bond
healchemists.xyz
oofcarpenternearme-jp.xyz
enewebsolutions.online
harepoint.legal
88977.club
omptables.xyz
eat-pumps-31610.bond
endown.graphics
amsexgirls.website
ovevibes.xyz
u-thiensu.online
yblinds.xyz
rumpchiefofstaff.store
erzog.fun
rrm.lat
agiclime.pro
agaviet59.shop
lbdoanhnhan.net
irvasenitpalvelut.online
strange.store
bsidiansurvival.shop
lown.bond
irrorbd.online
idzev.shop
tyleyourvibe.shop
qweemaildwqfewew.live
sychology-degree-92767.bond
orklift-jobs-76114.bond
nytymeoccassions.store
nfluencer-marketing-41832.bond
rh799295w.vip
066661a23.buzz
m235a.net
omestur.online
nalyzator.fun
itchen-remodeling-41686.bond
ontenbully.shop
oratrading.best
tiwebu.info
lueticks.shop
ocubox.xyz
q33.lat
earch-solar-installer-top.today
ceqne.vip
8betpragmatic.store
oftware-download-37623.bond
oofing-jobs-29700.bond
vorachem.xyz
ruck-driver-jobs-58337.bond
om-exchange-nft370213.sbs
jfghnxnvdfgh.icu
inhngoc.webcam
ruck-driver-jobs-86708.bond
oftware-engineering-27699.bond
nfoyl.xyz
estionprojetsccpm.online
reativesos.studio
ammamiaitalia.net
4cw.lat
oofighters.xyz
ukusindo4dpools.net
yhbvc.xyz
8435.pizza
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/2516-32-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1004-88-0x0000000000CC0000-0x0000000000CEF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3540 powershell.exe 1220 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4944 set thread context of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 2516 set thread context of 3452 2516 RegSvcs.exe 56 PID 1004 set thread context of 3452 1004 ipconfig.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1004 ipconfig.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 3540 powershell.exe 1220 powershell.exe 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 2516 RegSvcs.exe 2516 RegSvcs.exe 2516 RegSvcs.exe 2516 RegSvcs.exe 3540 powershell.exe 1220 powershell.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe 1004 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2516 RegSvcs.exe 2516 RegSvcs.exe 2516 RegSvcs.exe 1004 ipconfig.exe 1004 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeDebugPrivilege 1220 powershell.exe Token: SeDebugPrivilege 2516 RegSvcs.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE Token: SeDebugPrivilege 1004 ipconfig.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3540 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 98 PID 4944 wrote to memory of 3540 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 98 PID 4944 wrote to memory of 3540 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 98 PID 4944 wrote to memory of 1220 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 100 PID 4944 wrote to memory of 1220 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 100 PID 4944 wrote to memory of 1220 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 100 PID 4944 wrote to memory of 4516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 102 PID 4944 wrote to memory of 4516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 102 PID 4944 wrote to memory of 4516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 102 PID 4944 wrote to memory of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 4944 wrote to memory of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 4944 wrote to memory of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 4944 wrote to memory of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 4944 wrote to memory of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 4944 wrote to memory of 2516 4944 28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe 104 PID 3452 wrote to memory of 1004 3452 Explorer.EXE 105 PID 3452 wrote to memory of 1004 3452 Explorer.EXE 105 PID 3452 wrote to memory of 1004 3452 Explorer.EXE 105 PID 1004 wrote to memory of 2752 1004 ipconfig.exe 106 PID 1004 wrote to memory of 2752 1004 ipconfig.exe 106 PID 1004 wrote to memory of 2752 1004 ipconfig.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe"C:\Users\Admin\AppData\Local\Temp\28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\28a65019d2736dd82fdb229c9e6f5ff053c25e095d118ae03359238f44ba22d7.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dVNcpHUEH.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dVNcpHUEH" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD830.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5563ff3d146941095664dfa77630dac10
SHA122a943847f5c5913be7dc35ba2cf08ecb00ecd4a
SHA256536bd2d048605271ccc0ba1ecea38ec4d8d72b137d94e87ddc2856741d6bbd6b
SHA51252d4b9df55749b67cd271c6d9381a4c7ca78b9e3e03f83a38f83a593526cf0d1e19f0b27888632a106279b7e1dcda9e89d323149b3dee7a6ea1d98f5911bd529
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD575f5d629da3910797b3a04a632d26210
SHA185206e2f183816ff870caf37858dc66a8c64332a
SHA256037fbb821c273c3b6643f2def72b1924ea2409e900b81a348e2f8f35e88fb139
SHA512b54956294d72c7b79a6819dc0963924c4da4b0a8ced6ff73e3657cbf400d3a5aa79a1633e2784c64624953eb9ef09c9becc002ebfa646b56e6b40a7ac3482196