Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/02/2025, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
Payment Comfirmation.exe
Resource
win7-20241010-en
General
-
Target
Payment Comfirmation.exe
-
Size
772KB
-
MD5
86c532b1132630146227a27f3179d897
-
SHA1
8bd4224bf2079d60e6fef9e40ab7bc1ea391315a
-
SHA256
6be92b0d491f6d5d7f65e01a3336aac1155f091ad6def08b541e07b68eda3bb4
-
SHA512
4272bb687f400e0adcf8a5c2b48d7d4a5d4a46e5cde9b2f5d4cba50030842bb8ff0b14658308fd059730a2e4c8acdffabc5da510b9679c530ab944e50ef7896a
-
SSDEEP
12288:Dvdi9wecl9iWse2abS7m3hoV1QicvYxJqd4trX0ir31DPyKI:DI9weFW+abrh2UAP7RXRrlDPyKI
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2176-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2344-28-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3044 powershell.exe 2692 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2772 set thread context of 2176 2772 Payment Comfirmation.exe 36 PID 2176 set thread context of 1188 2176 RegSvcs.exe 21 PID 2344 set thread context of 1188 2344 cmmon32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Comfirmation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2772 Payment Comfirmation.exe 2772 Payment Comfirmation.exe 2692 powershell.exe 3044 powershell.exe 2772 Payment Comfirmation.exe 2176 RegSvcs.exe 2176 RegSvcs.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe 2344 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2176 RegSvcs.exe 2176 RegSvcs.exe 2176 RegSvcs.exe 2344 cmmon32.exe 2344 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2772 Payment Comfirmation.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeDebugPrivilege 2176 RegSvcs.exe Token: SeDebugPrivilege 2344 cmmon32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2772 wrote to memory of 3044 2772 Payment Comfirmation.exe 30 PID 2772 wrote to memory of 3044 2772 Payment Comfirmation.exe 30 PID 2772 wrote to memory of 3044 2772 Payment Comfirmation.exe 30 PID 2772 wrote to memory of 3044 2772 Payment Comfirmation.exe 30 PID 2772 wrote to memory of 2692 2772 Payment Comfirmation.exe 32 PID 2772 wrote to memory of 2692 2772 Payment Comfirmation.exe 32 PID 2772 wrote to memory of 2692 2772 Payment Comfirmation.exe 32 PID 2772 wrote to memory of 2692 2772 Payment Comfirmation.exe 32 PID 2772 wrote to memory of 2640 2772 Payment Comfirmation.exe 34 PID 2772 wrote to memory of 2640 2772 Payment Comfirmation.exe 34 PID 2772 wrote to memory of 2640 2772 Payment Comfirmation.exe 34 PID 2772 wrote to memory of 2640 2772 Payment Comfirmation.exe 34 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 2772 wrote to memory of 2176 2772 Payment Comfirmation.exe 36 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 37 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 37 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 37 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 37 PID 2344 wrote to memory of 1976 2344 cmmon32.exe 38 PID 2344 wrote to memory of 1976 2344 cmmon32.exe 38 PID 2344 wrote to memory of 1976 2344 cmmon32.exe 38 PID 2344 wrote to memory of 1976 2344 cmmon32.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Payment Comfirmation.exe"C:\Users\Admin\AppData\Local\Temp\Payment Comfirmation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Payment Comfirmation.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RocLTyIPaHuYP.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RocLTyIPaHuYP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7BE4.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562ef6f4694ca2567c63795eea86460c6
SHA1af7c78ba2844c791e11ab729e851481f3a8e6c47
SHA256801ec04d876437623745fe89ec95e5e57a3007e3d759fe0474432a9d9aaeca23
SHA5120e5817df8a1ae0270466932cc20eb3e5a66eab078d037d88bddfdd28c68e78feba7e90a419059c6119a31d9b13a81436fe7028bc864d2ca39c4f1286d96094db
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5cb7f82fd6b026e2cc76ef2167c8479fc
SHA1ffc28419de2d7e02d1e43e72a1fbb84a256c8458
SHA25618ee1e8f84d5175175ec20425564d4cb66299e430d483f4d692d3809f141f572
SHA512910941aea024f68a1a77c338dfffef5a7c74f8650b3a8045c7475506a8f76c54058d59a2ce816801755d35af78345ef2b7f25105456b05c3b0ca6db4d7250c00