Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT pdf.exe
Resource
win7-20241010-en
General
-
Target
SWIFT pdf.exe
-
Size
687KB
-
MD5
2c108e76865f4f65725c9f3410c87cd0
-
SHA1
0c3776f261d22cdb975e3faf7b2070b0febb3030
-
SHA256
124a32f23ee38371976744f5787e82d923cb0d2a366d75d6ca74a9a774a74a23
-
SHA512
7c3c1ce1321f0672b6f59b43f670a479506353b2070b207ead10338d65c21fd9b05ab862904c42764d796208527c7c42576d370ff3e47e82b42687afed8ba298
-
SSDEEP
12288:/Y2qghb7wmWrBpoMwnwVrG9R6hUBB3PaRHlOGiI818efoXFYiqp:w2dbK3xwnSrZOa2Gi3HoXy
Malware Config
Extracted
formbook
4.1
o10c
regnancy-67873.bond
oppyworld.fun
oomoo.store
illyjolly.online
-avi.art
unisitri.net
unaid-jamshed.shop
ookcovers.xyz
estrated.xyz
rpa.club
4rcraft.online
litz.baby
lysiannails.art
commerce-69321.bond
rokidu.info
havuonvanthanh.store
hiteelephant.online
ghkp.shop
uabf.info
ynthesizerwf.store
kipthegaames.online
92.info
ahjongwins3.cyou
laygroundsequipment.xyz
dhd-treatment-42199.bond
yallergies.online
wefright.net
ancasterequinemassage.net
onja.shop
lugsq.info
rilby.store
nitogel.skin
yskillandyou.xyz
ackcleveland.biz
eziser.fun
uto-loans-in-africa-2024.today
nfluencer-marketing-38653.bond
06ks7.club
lossar.online
hinoplasty-solutions.sbs
y01.vip
r210.info
nfoviral99.xyz
wnyourhealth.xyz
olarmedia.xyz
obotquote.net
aklandpt.net
aifunclub.fit
uivlio.xyz
aromzeciri.shop
panda.xyz
cassg.net
rotableblender.online
ealthyzone.live
bewuxi.info
nline-advertising-37613.bond
mazonworld.store
aixabank.video
rginine555.store
igsawgame.xyz
rbantravelstories.online
engdianertian.vip
d97.lat
enamind.net
izalmart.shop
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1784-34-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1784-40-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3660-78-0x0000000000C30000-0x0000000000C5F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2556 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2436272344-4274332273-444425594-1000\Control Panel\International\Geo\Nation SWIFT pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3584 set thread context of 1784 3584 SWIFT pdf.exe 93 PID 1784 set thread context of 3408 1784 RegSvcs.exe 56 PID 3660 set thread context of 3408 3660 cmd.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SWIFT pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3584 SWIFT pdf.exe 2556 powershell.exe 3584 SWIFT pdf.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 2556 powershell.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe 3660 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1784 RegSvcs.exe 1784 RegSvcs.exe 1784 RegSvcs.exe 3660 cmd.exe 3660 cmd.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3584 SWIFT pdf.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 1784 RegSvcs.exe Token: SeDebugPrivilege 3660 cmd.exe Token: SeShutdownPrivilege 3408 Explorer.EXE Token: SeCreatePagefilePrivilege 3408 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3408 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3584 wrote to memory of 2556 3584 SWIFT pdf.exe 89 PID 3584 wrote to memory of 2556 3584 SWIFT pdf.exe 89 PID 3584 wrote to memory of 2556 3584 SWIFT pdf.exe 89 PID 3584 wrote to memory of 2392 3584 SWIFT pdf.exe 91 PID 3584 wrote to memory of 2392 3584 SWIFT pdf.exe 91 PID 3584 wrote to memory of 2392 3584 SWIFT pdf.exe 91 PID 3584 wrote to memory of 1784 3584 SWIFT pdf.exe 93 PID 3584 wrote to memory of 1784 3584 SWIFT pdf.exe 93 PID 3584 wrote to memory of 1784 3584 SWIFT pdf.exe 93 PID 3584 wrote to memory of 1784 3584 SWIFT pdf.exe 93 PID 3584 wrote to memory of 1784 3584 SWIFT pdf.exe 93 PID 3584 wrote to memory of 1784 3584 SWIFT pdf.exe 93 PID 3408 wrote to memory of 3660 3408 Explorer.EXE 94 PID 3408 wrote to memory of 3660 3408 Explorer.EXE 94 PID 3408 wrote to memory of 3660 3408 Explorer.EXE 94 PID 3660 wrote to memory of 4788 3660 cmd.exe 95 PID 3660 wrote to memory of 4788 3660 cmd.exe 95 PID 3660 wrote to memory of 4788 3660 cmd.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\SWIFT pdf.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT pdf.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JnVKXZkOEdAX.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JnVKXZkOEdAX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCF66.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD564c7dbc4d2565fc0f266b8ee13595a58
SHA1946ee17ce1fa43463c167b3e985d51347ba8b628
SHA25678d6b6850534e0cc4b58408d483d1fdc207f28c8e8271ec256b9e534f39901b1
SHA512ee6fcea1c3a61b967268e3cce1e78c24b03916668b5a86a7f8b406ac4936af327b86795351a5b204fb47d28c961853799c006c76ed3f8fee4399106fbc62b9f3