Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
payment information.exe
Resource
win7-20240903-en
General
-
Target
payment information.exe
-
Size
677KB
-
MD5
79b677627ca09f3e8e15bdad1040b11d
-
SHA1
bfb6d6fbdec73cc0715a21f40895ab442a279734
-
SHA256
8f41896e69d1f83408cf68e4d6fc56849a6ee6b86145e7cc68d6caed660ac582
-
SHA512
b5e6c0a66bcdd05bd53de3efd33b7c5f5faea5799de4f7aa8a31a68a9c872f27d6886807ef2e3ae9e7541804313d1c51efa66085d52e51e60fc6f62f23fe1a83
-
SSDEEP
12288:u4xLs4Eha1KQwdtcyTD3G3eVHCpPwRksFfwGsRPrC/uL11HDsqHx6YTkhBoM3:u4tE41Ydt9G3epfwGsV2/A1HdxchBoM
Malware Config
Extracted
formbook
4.1
a01d
eniorshousing05.shop
rywisevas.biz
4726.pizza
itchen-design-42093.bond
3456.tech
4825.plus
nlinecraps.xyz
itamins-52836.bond
nfluencer-marketing-40442.bond
nline-advertising-58573.bond
rautogroups.net
limbtrip.net
oftware-download-14501.bond
nline-advertising-66733.bond
erity.xyz
xknrksi.icu
x-ist.club
yber-security-26409.bond
oincatch.xyz
onitoring-devices-34077.bond
hbvc.xyz
xecadminadvo.vip
ookers.homes
irlypods.shop
nalyzator.fun
rinciple.press
ejigghq.company
nity-officiels.shop
chtm.info
ggrupdanismanlik.online
alterjaviersemolic.online
6zc.lat
ukce.fun
ikretgunay.online
d8ns7gu.skin
06ks7.club
icovideo.voyage
nlinetutoringcanada776681.icu
etzero.icu
228080a0.buzz
agoslotoke.art
ruaim.online
nline-mba-87219.bond
oldsaver.biz
agonel.online
ommbank.video
indlab.shop
hesweettray.store
bilebe.info
uxemasculine.store
arkbarron.xyz
ektor.fun
8255.pizza
ike-loans-53803.bond
ong-ya.info
costcomembers-wholesale.online
75396.vip
leaning-services-53131.bond
uickcabinet.net
alifstorch.online
ahtel.net
usinessoverpleasure.shop
duway.pro
usiness-software-47704.bond
ustonehuman.info
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2876-25-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2876-29-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1140-32-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2316 powershell.exe 2748 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2236 set thread context of 2876 2236 payment information.exe 37 PID 2876 set thread context of 1236 2876 RegSvcs.exe 21 PID 2876 set thread context of 1236 2876 RegSvcs.exe 21 PID 1140 set thread context of 1236 1140 ipconfig.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language payment information.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1140 ipconfig.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2236 payment information.exe 2236 payment information.exe 2748 powershell.exe 2316 powershell.exe 2876 RegSvcs.exe 2876 RegSvcs.exe 2876 RegSvcs.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe 1140 ipconfig.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2876 RegSvcs.exe 2876 RegSvcs.exe 2876 RegSvcs.exe 2876 RegSvcs.exe 1140 ipconfig.exe 1140 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2236 payment information.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 2876 RegSvcs.exe Token: SeDebugPrivilege 1140 ipconfig.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2316 2236 payment information.exe 31 PID 2236 wrote to memory of 2316 2236 payment information.exe 31 PID 2236 wrote to memory of 2316 2236 payment information.exe 31 PID 2236 wrote to memory of 2316 2236 payment information.exe 31 PID 2236 wrote to memory of 2748 2236 payment information.exe 33 PID 2236 wrote to memory of 2748 2236 payment information.exe 33 PID 2236 wrote to memory of 2748 2236 payment information.exe 33 PID 2236 wrote to memory of 2748 2236 payment information.exe 33 PID 2236 wrote to memory of 2832 2236 payment information.exe 35 PID 2236 wrote to memory of 2832 2236 payment information.exe 35 PID 2236 wrote to memory of 2832 2236 payment information.exe 35 PID 2236 wrote to memory of 2832 2236 payment information.exe 35 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2236 wrote to memory of 2876 2236 payment information.exe 37 PID 2876 wrote to memory of 1140 2876 RegSvcs.exe 38 PID 2876 wrote to memory of 1140 2876 RegSvcs.exe 38 PID 2876 wrote to memory of 1140 2876 RegSvcs.exe 38 PID 2876 wrote to memory of 1140 2876 RegSvcs.exe 38 PID 1140 wrote to memory of 1160 1140 ipconfig.exe 39 PID 1140 wrote to memory of 1160 1140 ipconfig.exe 39 PID 1140 wrote to memory of 1160 1140 ipconfig.exe 39 PID 1140 wrote to memory of 1160 1140 ipconfig.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\payment information.exe"C:\Users\Admin\AppData\Local\Temp\payment information.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\payment information.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jQxyJJEBfe.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jQxyJJEBfe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp10A.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51f0dd5fbed6b350e938106b86ce93768
SHA1879ee4906776cfc6542f89a69a96f4362d333e2c
SHA2563e48a6ab2604003781116c4bd1d90c8401ddecbe025ff93e145220caa093f3f6
SHA512c11485e199a74305c76a027492b5da90653899fbbeb4c10b3801f1d69f8459ccbd1cea1e60b9bebfcffe195c57e9138ee15ddb5e19313ff20eacb2eb0dd851e9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59360bd6e6cab6f73f6cdd63942865c40
SHA1034dfa63ead54bc4a439296b82ec0dfcdb50d767
SHA256bc4f46734785e561df69dcd40104811340695ef2b9334e56c6d2c0ebccac46d4
SHA51295ab64f3c5d65996eefa311f7afb39df47ad6b490f70ff0ab2f78c37beea3d29457b586160eef94f2616406974bab043c6ea7fbb8766cfa5f5de3a5299af4882