Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe
Resource
win7-20240903-en
General
-
Target
205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe
-
Size
802KB
-
MD5
9a7cb2884499e277aef3285bb7ac621a
-
SHA1
61a63562d75ccb13478aee39dc80395329357d7a
-
SHA256
205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075
-
SHA512
15e6e63a8fd1764dca53a34fbd6fa9ac99849ca43d34327741f87c9f80a931cfdd71c7c993e6764e16c34f9a60ec5edabe745fd646339601eebbf783a7fd967b
-
SSDEEP
12288:WzSggsiqyjHBCYiOKE5uz0nL4EJhyJvgOE4qYCvI7:Wz1KuT8L4QIJvJE9YCvI
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/184-85-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/184-89-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2308-92-0x00000000006E0000-0x000000000070F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1164 powershell.exe 4564 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Control Panel\International\Geo\Nation 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 816 set thread context of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 184 set thread context of 3488 184 RegSvcs.exe 55 PID 184 set thread context of 3488 184 RegSvcs.exe 55 PID 2308 set thread context of 3488 2308 WWAHost.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 4564 powershell.exe 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 4564 powershell.exe 1164 powershell.exe 1164 powershell.exe 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 184 RegSvcs.exe 184 RegSvcs.exe 184 RegSvcs.exe 184 RegSvcs.exe 184 RegSvcs.exe 184 RegSvcs.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe 2308 WWAHost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 184 RegSvcs.exe 184 RegSvcs.exe 184 RegSvcs.exe 184 RegSvcs.exe 2308 WWAHost.exe 2308 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe Token: SeDebugPrivilege 4564 powershell.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 184 RegSvcs.exe Token: SeDebugPrivilege 2308 WWAHost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 816 wrote to memory of 4564 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 84 PID 816 wrote to memory of 4564 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 84 PID 816 wrote to memory of 4564 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 84 PID 816 wrote to memory of 1164 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 86 PID 816 wrote to memory of 1164 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 86 PID 816 wrote to memory of 1164 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 86 PID 816 wrote to memory of 2140 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 88 PID 816 wrote to memory of 2140 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 88 PID 816 wrote to memory of 2140 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 88 PID 816 wrote to memory of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 816 wrote to memory of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 816 wrote to memory of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 816 wrote to memory of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 816 wrote to memory of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 816 wrote to memory of 184 816 205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe 90 PID 3488 wrote to memory of 2308 3488 Explorer.EXE 93 PID 3488 wrote to memory of 2308 3488 Explorer.EXE 93 PID 3488 wrote to memory of 2308 3488 Explorer.EXE 93 PID 2308 wrote to memory of 2388 2308 WWAHost.exe 94 PID 2308 wrote to memory of 2388 2308 WWAHost.exe 94 PID 2308 wrote to memory of 2388 2308 WWAHost.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe"C:\Users\Admin\AppData\Local\Temp\205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\205e98d299b32e102e3d6fadb9659f713601f8f713be02cec1ec0f437d3be075.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QzRGBFLaJH.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzRGBFLaJH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5148.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD52a3aef65b9274b31278b5d4ad5af82f7
SHA1bd2034474c041496b79250c42e0ad4dcd8a50195
SHA256e3267b399b2d12774b049d64e05f32b2c19b28daa60f92e28ec4d81d8fe81e81
SHA5123a467d4f23ea8b0fb653d9beca785e59667fe2571079ca78b47eb3fd0a8f5fa4787a72091ad4bcb9ef8fd6f08a729e7d27343ea6026e7b741cf7c5f6ccea737b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD53f6d76a11f8adde6041ec70b2d870cb7
SHA1f837e66e0c3de1fbd4dc4e8a58e04ad0a0f53710
SHA256c653b7c97b58a23a0e1f9d287886a10a74469c7becadb2499966192da2232c40
SHA5121921abe2770038fc2daac6e66c5976589d5b693b08aac2cb9fa0d413b3921d0801475c233e0eb7b0d1c07fe18609e17e849128cb2ef15508ef9abb5cb52c64f7