Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 02:32
Static task
static1
Behavioral task
behavioral1
Sample
Inv_7623980.exe
Resource
win7-20230220-en
General
-
Target
Inv_7623980.exe
-
Size
641KB
-
MD5
f8bb833541c11d6047b83b5139c794ea
-
SHA1
1f7e9ecf6af1ad967edd59aeb79494b4b0b8fa2f
-
SHA256
cfe9062e6bd88ae993c3e8b295386c2e5e9aa7d8b9ceb168f56ccd3e0e5cbe36
-
SHA512
1512de031fb2f8f96b03d66c65fefc5294209eac5ecfdedb76514aa93b17ea3a42edf36b63d8d9c6c2c83940e956fc9995828f94db8d1a4070ce473b10bb9238
-
SSDEEP
12288:syhuMA80Mgixbs+aZvPrMygTI6iNiP59swToysTNin:syhjA8pxbsHZ4pJiNiPrswzsT
Malware Config
Extracted
formbook
4.1
m82
jamesdevereux.com
artificialturfminneapolis.com
hongmeiyan.com
lojaderoupasbr.com
yit.africa
austinrelocationexpert.com
saiva.page
exitsategy.com
chochonux.com
klosterbraeu-unterliezheim.com
byseymanur.com
sblwarwickshire.co.uk
brazimaid.com
ciogame.com
bronzesailing.com
dwkapl.xyz
022dyd.com
compassandpathwriting.com
alphabet1x.com
selfcleaninghairbrush.co.uk
power-bank.co.uk
kickskaart.com
baumanbilliardsnv.com
bestcp.net
doghospitalnearme.com
mixano.africa
helarybaber.online
illubio.com
ciutas.com
ldpr33.ru
killtheblacks.com
cassino-portugal.com
danhaii.com
gvtowingservice.com
let-travel.africa
dental-implants-67128.com
facetaxi.xyz
ctjh9u8e.vip
kyosaiohruri.com
executivepresencetrainer.com
greatharmony.africa
feelingsarereal.com
devopsuday.club
happiestminds-udemy.com
fittingstands.com
happyhousegarment.com
24daysofheaven.com
herhustlenation.com
xn--oy2b27nt6b.net
hothotcogixem.online
hausmeisterservice-berlin.net
hjddbb.com
stoutfamilychiro.com
bookishthoughtsbychristy.com
gibellinaheartquake.com
8cf1utrb6.xyz
patrick-daggitt.com
ebcbank.net
angel909reviews.com
arcteryxsouthafricaonline.com
cutematvhy.com
art2z.com
bulkforeverstamps.com
heatbling.com
despachocontablequinsa.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/880-147-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/880-165-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4936-187-0x0000000000310000-0x000000000033F000-memory.dmp formbook behavioral2/memory/4936-195-0x0000000000310000-0x000000000033F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Inv_7623980.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation Inv_7623980.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Inv_7623980.exeRegSvcs.exeNETSTAT.EXEdescription pid process target process PID 524 set thread context of 880 524 Inv_7623980.exe RegSvcs.exe PID 880 set thread context of 3236 880 RegSvcs.exe Explorer.EXE PID 4936 set thread context of 3236 4936 NETSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 4936 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
Inv_7623980.exepowershell.exeRegSvcs.exeNETSTAT.EXEpid process 524 Inv_7623980.exe 524 Inv_7623980.exe 3916 powershell.exe 3916 powershell.exe 880 RegSvcs.exe 880 RegSvcs.exe 880 RegSvcs.exe 880 RegSvcs.exe 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE 4936 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exeNETSTAT.EXEpid process 880 RegSvcs.exe 880 RegSvcs.exe 880 RegSvcs.exe 4936 NETSTAT.EXE 4936 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Inv_7623980.exepowershell.exeRegSvcs.exeNETSTAT.EXEExplorer.EXEdescription pid process Token: SeDebugPrivilege 524 Inv_7623980.exe Token: SeDebugPrivilege 3916 powershell.exe Token: SeDebugPrivilege 880 RegSvcs.exe Token: SeDebugPrivilege 4936 NETSTAT.EXE Token: SeShutdownPrivilege 3236 Explorer.EXE Token: SeCreatePagefilePrivilege 3236 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Inv_7623980.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 524 wrote to memory of 3916 524 Inv_7623980.exe powershell.exe PID 524 wrote to memory of 3916 524 Inv_7623980.exe powershell.exe PID 524 wrote to memory of 3916 524 Inv_7623980.exe powershell.exe PID 524 wrote to memory of 2144 524 Inv_7623980.exe schtasks.exe PID 524 wrote to memory of 2144 524 Inv_7623980.exe schtasks.exe PID 524 wrote to memory of 2144 524 Inv_7623980.exe schtasks.exe PID 524 wrote to memory of 880 524 Inv_7623980.exe RegSvcs.exe PID 524 wrote to memory of 880 524 Inv_7623980.exe RegSvcs.exe PID 524 wrote to memory of 880 524 Inv_7623980.exe RegSvcs.exe PID 524 wrote to memory of 880 524 Inv_7623980.exe RegSvcs.exe PID 524 wrote to memory of 880 524 Inv_7623980.exe RegSvcs.exe PID 524 wrote to memory of 880 524 Inv_7623980.exe RegSvcs.exe PID 3236 wrote to memory of 4936 3236 Explorer.EXE NETSTAT.EXE PID 3236 wrote to memory of 4936 3236 Explorer.EXE NETSTAT.EXE PID 3236 wrote to memory of 4936 3236 Explorer.EXE NETSTAT.EXE PID 4936 wrote to memory of 4824 4936 NETSTAT.EXE cmd.exe PID 4936 wrote to memory of 4824 4936 NETSTAT.EXE cmd.exe PID 4936 wrote to memory of 4824 4936 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Inv_7623980.exe"C:\Users\Admin\AppData\Local\Temp\Inv_7623980.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WTlsRQtwWJZBlb.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WTlsRQtwWJZBlb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp31ED.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kacqtvm0.vqs.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp31ED.tmpFilesize
1KB
MD556db6f05b475e2635ef66863f7bb914f
SHA14b0957953a7df39b6a60dc499125aa9d95ac7ece
SHA256a55d08adae79004284beabcb0750ec7d0bafe2f016ea68d2a929327d5698e1eb
SHA5127995f635447ef92cf4cbb0749289a421ae6a162c15bd19c9dfb6faa3397f96a3984c599f4f089704862b8c224f6476b913e0d6fa1b6c3b39fb315bc8b3f200e3
-
memory/524-137-0x0000000005940000-0x0000000005950000-memory.dmpFilesize
64KB
-
memory/524-133-0x0000000000F30000-0x0000000000FD6000-memory.dmpFilesize
664KB
-
memory/524-134-0x0000000005E70000-0x0000000006414000-memory.dmpFilesize
5.6MB
-
memory/524-138-0x0000000005940000-0x0000000005950000-memory.dmpFilesize
64KB
-
memory/524-139-0x0000000007600000-0x000000000769C000-memory.dmpFilesize
624KB
-
memory/524-136-0x0000000005B30000-0x0000000005B3A000-memory.dmpFilesize
40KB
-
memory/524-135-0x0000000005970000-0x0000000005A02000-memory.dmpFilesize
584KB
-
memory/880-164-0x0000000001130000-0x000000000147A000-memory.dmpFilesize
3.3MB
-
memory/880-147-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/880-166-0x0000000000C40000-0x0000000000C55000-memory.dmpFilesize
84KB
-
memory/880-165-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3236-198-0x0000000008540000-0x00000000086BD000-memory.dmpFilesize
1.5MB
-
memory/3236-199-0x0000000008540000-0x00000000086BD000-memory.dmpFilesize
1.5MB
-
memory/3236-167-0x0000000008430000-0x0000000008533000-memory.dmpFilesize
1.0MB
-
memory/3916-148-0x0000000005CA0000-0x00000000062C8000-memory.dmpFilesize
6.2MB
-
memory/3916-191-0x0000000007F80000-0x0000000007F9A000-memory.dmpFilesize
104KB
-
memory/3916-157-0x0000000006340000-0x00000000063A6000-memory.dmpFilesize
408KB
-
memory/3916-151-0x0000000005C10000-0x0000000005C76000-memory.dmpFilesize
408KB
-
memory/3916-150-0x0000000005970000-0x0000000005992000-memory.dmpFilesize
136KB
-
memory/3916-168-0x00000000078E0000-0x0000000007912000-memory.dmpFilesize
200KB
-
memory/3916-169-0x00000000719E0000-0x0000000071A2C000-memory.dmpFilesize
304KB
-
memory/3916-179-0x0000000006EE0000-0x0000000006EFE000-memory.dmpFilesize
120KB
-
memory/3916-180-0x0000000005660000-0x0000000005670000-memory.dmpFilesize
64KB
-
memory/3916-181-0x000000007F840000-0x000000007F850000-memory.dmpFilesize
64KB
-
memory/3916-182-0x0000000008280000-0x00000000088FA000-memory.dmpFilesize
6.5MB
-
memory/3916-183-0x0000000007C40000-0x0000000007C5A000-memory.dmpFilesize
104KB
-
memory/3916-184-0x0000000007CB0000-0x0000000007CBA000-memory.dmpFilesize
40KB
-
memory/3916-144-0x0000000003030000-0x0000000003066000-memory.dmpFilesize
216KB
-
memory/3916-146-0x0000000005660000-0x0000000005670000-memory.dmpFilesize
64KB
-
memory/3916-192-0x0000000007F60000-0x0000000007F68000-memory.dmpFilesize
32KB
-
memory/3916-188-0x0000000007EC0000-0x0000000007F56000-memory.dmpFilesize
600KB
-
memory/3916-189-0x0000000007E70000-0x0000000007E7E000-memory.dmpFilesize
56KB
-
memory/3916-162-0x0000000006920000-0x000000000693E000-memory.dmpFilesize
120KB
-
memory/4936-190-0x0000000000C40000-0x0000000000F8A000-memory.dmpFilesize
3.3MB
-
memory/4936-187-0x0000000000310000-0x000000000033F000-memory.dmpFilesize
188KB
-
memory/4936-195-0x0000000000310000-0x000000000033F000-memory.dmpFilesize
188KB
-
memory/4936-197-0x0000000000A90000-0x0000000000B24000-memory.dmpFilesize
592KB
-
memory/4936-186-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB
-
memory/4936-185-0x00000000001B0000-0x00000000001BB000-memory.dmpFilesize
44KB