Analysis
-
max time kernel
189s -
max time network
205s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp4xdhc_0k.exe
Resource
win7-20230220-en
General
-
Target
tmp4xdhc_0k.exe
-
Size
612KB
-
MD5
97ab2171b12f2e2b41f65c02f23da953
-
SHA1
5f8c09681c05ef89b17737eebe9452e522848428
-
SHA256
a25247a44c6daf029eae02060c11c9a946d0648f2eedc1a6348822c7c6590af3
-
SHA512
f2f4816d4d7be2cf90ce6310ca1fc4dd02f556d8bad21b9f22e1a8092bea20f9ebd0667dec726cfdb6cb338c61b8a295420f18a07abbbfc10500482b4d6ed2b7
-
SSDEEP
12288:UjLj//DKqnAoX8EIrdQE0b/QFoOKIrpYZIrDb0kt7OSbSU/:UPb/5n78rWzQSyCSrDb0kt7Hbf/
Malware Config
Extracted
formbook
4.1
m82
jamesdevereux.com
artificialturfminneapolis.com
hongmeiyan.com
lojaderoupasbr.com
yit.africa
austinrelocationexpert.com
saiva.page
exitsategy.com
chochonux.com
klosterbraeu-unterliezheim.com
byseymanur.com
sblwarwickshire.co.uk
brazimaid.com
ciogame.com
bronzesailing.com
dwkapl.xyz
022dyd.com
compassandpathwriting.com
alphabet1x.com
selfcleaninghairbrush.co.uk
power-bank.co.uk
kickskaart.com
baumanbilliardsnv.com
bestcp.net
doghospitalnearme.com
mixano.africa
helarybaber.online
illubio.com
ciutas.com
ldpr33.ru
killtheblacks.com
cassino-portugal.com
danhaii.com
gvtowingservice.com
let-travel.africa
dental-implants-67128.com
facetaxi.xyz
ctjh9u8e.vip
kyosaiohruri.com
executivepresencetrainer.com
greatharmony.africa
feelingsarereal.com
devopsuday.club
happiestminds-udemy.com
fittingstands.com
happyhousegarment.com
24daysofheaven.com
herhustlenation.com
xn--oy2b27nt6b.net
hothotcogixem.online
hausmeisterservice-berlin.net
hjddbb.com
stoutfamilychiro.com
bookishthoughtsbychristy.com
gibellinaheartquake.com
8cf1utrb6.xyz
patrick-daggitt.com
ebcbank.net
angel909reviews.com
arcteryxsouthafricaonline.com
cutematvhy.com
art2z.com
bulkforeverstamps.com
heatbling.com
despachocontablequinsa.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1780-68-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1780-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/568-77-0x0000000000090000-0x00000000000BF000-memory.dmp formbook behavioral1/memory/568-80-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2020 set thread context of 1780 2020 tmp4xdhc_0k.exe 30 PID 1780 set thread context of 1312 1780 RegSvcs.exe 16 PID 568 set thread context of 1312 568 wuapp.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2020 tmp4xdhc_0k.exe 1780 RegSvcs.exe 1780 RegSvcs.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1312 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1780 RegSvcs.exe 1780 RegSvcs.exe 1780 RegSvcs.exe 568 wuapp.exe 568 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2020 tmp4xdhc_0k.exe Token: SeDebugPrivilege 1780 RegSvcs.exe Token: SeDebugPrivilege 568 wuapp.exe Token: SeShutdownPrivilege 1312 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2020 wrote to memory of 768 2020 tmp4xdhc_0k.exe 28 PID 2020 wrote to memory of 768 2020 tmp4xdhc_0k.exe 28 PID 2020 wrote to memory of 768 2020 tmp4xdhc_0k.exe 28 PID 2020 wrote to memory of 768 2020 tmp4xdhc_0k.exe 28 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 2020 wrote to memory of 1780 2020 tmp4xdhc_0k.exe 30 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 1312 wrote to memory of 568 1312 Explorer.EXE 31 PID 568 wrote to memory of 1008 568 wuapp.exe 32 PID 568 wrote to memory of 1008 568 wuapp.exe 32 PID 568 wrote to memory of 1008 568 wuapp.exe 32 PID 568 wrote to memory of 1008 568 wuapp.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\tmp4xdhc_0k.exe"C:\Users\Admin\AppData\Local\Temp\tmp4xdhc_0k.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pWWigddan" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBF1C.tmp"3⤵
- Creates scheduled task(s)
PID:768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1008
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55940d2250d23924b5a3f7c3eef577535
SHA19980583ed2f706b3f181a82f895bbb46b0e01772
SHA256cc21fd76f09770e660d9db2c09085b32453d3477ec0ee6c393e1c371713d3879
SHA5120484588601469ca7b6812d63cb0cc2359b04c5b71bf5ad8a5df317e6bfb47920f347aa1ceaa8132655ccc29f01e3c12d8d3b92be247935d0264d30b97cc4d79d