Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 02:32
Static task
static1
Behavioral task
behavioral1
Sample
Inv_7623980.exe
Resource
win7-20230220-en
General
-
Target
Inv_7623980.exe
-
Size
641KB
-
MD5
f8bb833541c11d6047b83b5139c794ea
-
SHA1
1f7e9ecf6af1ad967edd59aeb79494b4b0b8fa2f
-
SHA256
cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36
-
SHA512
1512de031fb2f8f96b03d66c65fefc5294209eac5ecfdedb76514aa93b17ea3a42edf36b63d8d9c6c2c83940e956fc9995828f94db8d1a4070ce473b10bb9238
-
SSDEEP
12288:syhuMA80Mgixbs+aZvPrMygTI6iNiP59swToysTNin:syhjA8pxbsHZ4pJiNiPrswzsT
Malware Config
Extracted
formbook
4.1
m82
jamesdevereux.com
artificialturfminneapolis.com
hongmeiyan.com
lojaderoupasbr.com
yit.africa
austinrelocationexpert.com
saiva.page
exitsategy.com
chochonux.com
klosterbraeu-unterliezheim.com
byseymanur.com
sblwarwickshire.co.uk
brazimaid.com
ciogame.com
bronzesailing.com
dwkapl.xyz
022dyd.com
compassandpathwriting.com
alphabet1x.com
selfcleaninghairbrush.co.uk
power-bank.co.uk
kickskaart.com
baumanbilliardsnv.com
bestcp.net
doghospitalnearme.com
mixano.africa
helarybaber.online
illubio.com
ciutas.com
ldpr33.ru
killtheblacks.com
cassino-portugal.com
danhaii.com
gvtowingservice.com
let-travel.africa
dental-implants-67128.com
facetaxi.xyz
ctjh9u8e.vip
kyosaiohruri.com
executivepresencetrainer.com
greatharmony.africa
feelingsarereal.com
devopsuday.club
happiestminds-udemy.com
fittingstands.com
happyhousegarment.com
24daysofheaven.com
herhustlenation.com
xn--oy2b27nt6b.net
hothotcogixem.online
hausmeisterservice-berlin.net
hjddbb.com
stoutfamilychiro.com
bookishthoughtsbychristy.com
gibellinaheartquake.com
8cf1utrb6.xyz
patrick-daggitt.com
ebcbank.net
angel909reviews.com
arcteryxsouthafricaonline.com
cutematvhy.com
art2z.com
bulkforeverstamps.com
heatbling.com
despachocontablequinsa.com
Signatures
-
Formbook payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1516-71-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/924-72-0x0000000002640000-0x0000000002680000-memory.dmp formbook behavioral1/memory/1516-78-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1516-82-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/892-85-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/892-87-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Inv_7623980.exeRegSvcs.execmd.exedescription pid process target process PID 2044 set thread context of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 1516 set thread context of 1248 1516 RegSvcs.exe Explorer.EXE PID 1516 set thread context of 1248 1516 RegSvcs.exe Explorer.EXE PID 892 set thread context of 1248 892 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
Inv_7623980.exepowershell.exeRegSvcs.execmd.exepid process 2044 Inv_7623980.exe 2044 Inv_7623980.exe 924 powershell.exe 1516 RegSvcs.exe 1516 RegSvcs.exe 1516 RegSvcs.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe 892 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RegSvcs.execmd.exepid process 1516 RegSvcs.exe 1516 RegSvcs.exe 1516 RegSvcs.exe 1516 RegSvcs.exe 892 cmd.exe 892 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Inv_7623980.exepowershell.exeRegSvcs.execmd.exedescription pid process Token: SeDebugPrivilege 2044 Inv_7623980.exe Token: SeDebugPrivilege 924 powershell.exe Token: SeDebugPrivilege 1516 RegSvcs.exe Token: SeDebugPrivilege 892 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
Inv_7623980.exeExplorer.EXEcmd.exedescription pid process target process PID 2044 wrote to memory of 924 2044 Inv_7623980.exe powershell.exe PID 2044 wrote to memory of 924 2044 Inv_7623980.exe powershell.exe PID 2044 wrote to memory of 924 2044 Inv_7623980.exe powershell.exe PID 2044 wrote to memory of 924 2044 Inv_7623980.exe powershell.exe PID 2044 wrote to memory of 472 2044 Inv_7623980.exe schtasks.exe PID 2044 wrote to memory of 472 2044 Inv_7623980.exe schtasks.exe PID 2044 wrote to memory of 472 2044 Inv_7623980.exe schtasks.exe PID 2044 wrote to memory of 472 2044 Inv_7623980.exe schtasks.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 2044 wrote to memory of 1516 2044 Inv_7623980.exe RegSvcs.exe PID 1248 wrote to memory of 892 1248 Explorer.EXE cmd.exe PID 1248 wrote to memory of 892 1248 Explorer.EXE cmd.exe PID 1248 wrote to memory of 892 1248 Explorer.EXE cmd.exe PID 1248 wrote to memory of 892 1248 Explorer.EXE cmd.exe PID 892 wrote to memory of 984 892 cmd.exe cmd.exe PID 892 wrote to memory of 984 892 cmd.exe cmd.exe PID 892 wrote to memory of 984 892 cmd.exe cmd.exe PID 892 wrote to memory of 984 892 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Inv_7623980.exe"C:\Users\Admin\AppData\Local\Temp\Inv_7623980.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTlsRQtwWJZBlb.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WTlsRQtwWJZBlb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB694.tmp"3⤵
- Creates scheduled task(s)
PID:472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpB694.tmpFilesize
1KB
MD55666a8e7d4f2e970fe1f9b011e5e4b93
SHA1344399ada999667247e9a58550fa0274e8914601
SHA2566e937311a185abfddf3d1a5dfa208dc6dac8812429e2d3d9aad6e6cbade150f2
SHA5124be5804efed364e4f3515d75c19906408c889ca0029224e397670e7386c1d3b6bdbb0cd0dc2190d45eadbcccf18431f7a003e772a58ac6c2e4b77d16fe1e340c
-
memory/892-84-0x000000004A090000-0x000000004A0DC000-memory.dmpFilesize
304KB
-
memory/892-85-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/892-83-0x000000004A090000-0x000000004A0DC000-memory.dmpFilesize
304KB
-
memory/892-89-0x0000000001DA0000-0x0000000001E34000-memory.dmpFilesize
592KB
-
memory/892-87-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/892-86-0x0000000001F10000-0x0000000002213000-memory.dmpFilesize
3.0MB
-
memory/924-72-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/924-73-0x0000000002640000-0x0000000002680000-memory.dmpFilesize
256KB
-
memory/1248-93-0x0000000006A20000-0x0000000006B5B000-memory.dmpFilesize
1.2MB
-
memory/1248-91-0x0000000006A20000-0x0000000006B5B000-memory.dmpFilesize
1.2MB
-
memory/1248-77-0x00000000072A0000-0x000000000744B000-memory.dmpFilesize
1.7MB
-
memory/1248-90-0x0000000006A20000-0x0000000006B5B000-memory.dmpFilesize
1.2MB
-
memory/1248-81-0x0000000007530000-0x00000000076B8000-memory.dmpFilesize
1.5MB
-
memory/1248-79-0x00000000039D0000-0x0000000003AD0000-memory.dmpFilesize
1024KB
-
memory/1516-75-0x00000000008F0000-0x0000000000BF3000-memory.dmpFilesize
3.0MB
-
memory/1516-82-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1516-78-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1516-68-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1516-80-0x00000000001E0000-0x00000000001F5000-memory.dmpFilesize
84KB
-
memory/1516-71-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1516-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1516-76-0x0000000000190000-0x00000000001A5000-memory.dmpFilesize
84KB
-
memory/1516-69-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2044-54-0x00000000002D0000-0x0000000000376000-memory.dmpFilesize
664KB
-
memory/2044-67-0x0000000005170000-0x00000000051A8000-memory.dmpFilesize
224KB
-
memory/2044-59-0x00000000051C0000-0x0000000005230000-memory.dmpFilesize
448KB
-
memory/2044-58-0x0000000000270000-0x000000000027A000-memory.dmpFilesize
40KB
-
memory/2044-57-0x0000000004FA0000-0x0000000004FE0000-memory.dmpFilesize
256KB
-
memory/2044-56-0x0000000000250000-0x000000000025C000-memory.dmpFilesize
48KB
-
memory/2044-55-0x0000000004FA0000-0x0000000004FE0000-memory.dmpFilesize
256KB