Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
602QN20427-1.exe
Resource
win7-20230220-en
General
-
Target
602QN20427-1.exe
-
Size
719KB
-
MD5
6991d190933968b416189fe78bbb2d8b
-
SHA1
046a63283cf4eb75656bb4f4c99413fbd0f86e3b
-
SHA256
8b9641ea4b07a7e2e48a7be9f45a20b7c0663838d5430c90b452729843f4ea21
-
SHA512
d8e98ba1818f7ba3f32ae516cb4e059c8a8264333499c11595ade883aed89cf1ea449d38646fa1061ffc76e2b990e11e747215b8a5aad2d9060f4c38cb6ee509
-
SSDEEP
12288:9uzZBEP85trggY+9nmp35FVk9V7Sm3Ucu3eL8Xt1O6ctdWv0bO0lGbw:Q9BEP8wgYOcw313UcuuIXtNc+v0b7oE
Malware Config
Extracted
formbook
4.1
ce18
kenfinnegan.com
exopestireland.com
allthingzbeautiellc.com
attractiveidiot.com
calmsealight.com
ectobyte.com
8rr.xyz
hcmajq.info
alisongraceventures.com
jamtanganbagus.online
forexpropfirmmastery.com
coupimmobilier.com
amarisetechnologies.com
countrykidsclothing.com
eyecatcher.tech
merxip.online
fiteallc.com
themensroombarber.co.uk
seroofingtelford.co.uk
birdie786.com
tinasc.com
abadicash11.vip
beyondschoolwork.com
coachcreators.net
theoakwheel.co.uk
electrolyteelectric.com
bastetribal.com
bleatcement.online
sunsetnyc.com
bjzlccqz.com
loyaldiscount.com
gamerunr.com
keepaquarium.com
ecochec.ru
annakaiello.com
just-leanin.com
kitchen-furniture-66738.com
alibama.top
current-vacanies.com
hentaireaf.com
sim-virtual.net
wilkesalms.org.uk
bishopdelicious.com
dunamu-cabin.com
kessdaniels.com
x7c7h.com
permianmitsubishi.net
logmauk.co.uk
libertyconsul.com
dghg-106.com
bcpatil.com
diamondsilkregimen.com
nankanasaheb.com
incomeclub.africa
login-xfinity.net
fayetaylor.realtor
ljcfarms.africa
g-starnetwork.com
fullmography.com
cleanifylaundry.com
async.live
bigcommerce.rsvp
dominioncard.com
bankloan-dd.ru
bookcom34567875373733744444.top
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4104-148-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4104-182-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2408-188-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2408-196-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 602QN20427-1.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5004 set thread context of 4104 5004 602QN20427-1.exe 93 PID 4104 set thread context of 1920 4104 602QN20427-1.exe 47 PID 2408 set thread context of 1920 2408 help.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2836 powershell.exe 4104 602QN20427-1.exe 4104 602QN20427-1.exe 4104 602QN20427-1.exe 4104 602QN20427-1.exe 2836 powershell.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe 2408 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1920 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4104 602QN20427-1.exe 4104 602QN20427-1.exe 4104 602QN20427-1.exe 2408 help.exe 2408 help.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 4104 602QN20427-1.exe Token: SeDebugPrivilege 2408 help.exe Token: SeShutdownPrivilege 1920 Explorer.EXE Token: SeCreatePagefilePrivilege 1920 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2836 5004 602QN20427-1.exe 89 PID 5004 wrote to memory of 2836 5004 602QN20427-1.exe 89 PID 5004 wrote to memory of 2836 5004 602QN20427-1.exe 89 PID 5004 wrote to memory of 3700 5004 602QN20427-1.exe 91 PID 5004 wrote to memory of 3700 5004 602QN20427-1.exe 91 PID 5004 wrote to memory of 3700 5004 602QN20427-1.exe 91 PID 5004 wrote to memory of 4104 5004 602QN20427-1.exe 93 PID 5004 wrote to memory of 4104 5004 602QN20427-1.exe 93 PID 5004 wrote to memory of 4104 5004 602QN20427-1.exe 93 PID 5004 wrote to memory of 4104 5004 602QN20427-1.exe 93 PID 5004 wrote to memory of 4104 5004 602QN20427-1.exe 93 PID 5004 wrote to memory of 4104 5004 602QN20427-1.exe 93 PID 1920 wrote to memory of 2408 1920 Explorer.EXE 94 PID 1920 wrote to memory of 2408 1920 Explorer.EXE 94 PID 1920 wrote to memory of 2408 1920 Explorer.EXE 94 PID 2408 wrote to memory of 664 2408 help.exe 95 PID 2408 wrote to memory of 664 2408 help.exe 95 PID 2408 wrote to memory of 664 2408 help.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CDQXpTCzh.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CDQXpTCzh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp90A7.tmp"3⤵
- Creates scheduled task(s)
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"3⤵PID:664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5a53f836971a2a822e5cb9804ef7ab7c9
SHA1d27a28c04e41478d9850dda4047be3705a9f75d6
SHA25600440c2ffea59051e0b891731cf6fa10e5cd976b86b45b7648a520e31a5b3f19
SHA512f39a5526fa52d032b10e68c06fb42720c87dc7ccf9d3110e9bbc7e68a3a6ee04e4c7bf95c19587bf9f7c308e177e19866233f4dd1e0af5438a83d3cc284b1c8d