Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 07:13
Static task
static1
Behavioral task
behavioral1
Sample
UAE61 - 4510793563 - ALTAHER CHEM LLC.exe
Resource
win7-20230712-en
General
-
Target
UAE61 - 4510793563 - ALTAHER CHEM LLC.exe
-
Size
688KB
-
MD5
5c412f0f22b162d7f32cdbc9e500a1fd
-
SHA1
e116967f21c982cdd814d82d2d37594f5a806cce
-
SHA256
8a6e40ffa6aabeda07bd1c75dd8566bdb498ed5ef0eb523e8371e2fecda47e36
-
SHA512
dd7ad2c106dc1cb7da444807ef25c77da32bb8cb3fd27aaf86cd640d6873d2b0396eb2af2870c022c0387c8c85d11bc646662f3c28b152ff038b5495b360a1ef
-
SSDEEP
12288:N5MY3kRIBx5xkUQAs371jl1INLMRUGl9zaasU:N6KkRm5BZs7p2aUGs
Malware Config
Extracted
formbook
4.1
ga83
fastholdtalaric.mom
lokimusic.shop
sisucomms.xyz
techpass.net
tzyl197.com
merakibrokers.com
recargaswebdirectya.online
buzzinsourshot.net
ansuship.com
vawrs.com
osadchiy.site
bigdatacomponents.com
ssflsd.com
studiotecniconatasciafabbro.com
tiichat.com
counselingbank.com
4goodsolutions.xyz
blindajeparallantas.com
evergreenedu.xyz
dilital.com
mt51l.com
dawani.store
1932boutique.com
antroposoficamente.com
dot33.top
72sv.com
imbuez.com
sameekshapathak.com
fmeducations.com
bloxmanagementgroup.com
furnishioz.online
newlifestylechanges.com
4676cordobaway.com
poapra.com
baspalace.com
swteam9.click
807whitecap.com
se7enrising.com
socksuwear.com
5787nn.top
thetupi.com
dystopiarust.com
kpigpz.com
askubwerd.online
freedomfm.store
btcspotindex.com
hannahgriswold.com
benbarnes.online
grafix.design
salondoor.xyz
oxbet100.net
easytreina.com
elegantbold.life
ioigame.com
yv2rc9kzzpn7.com
thecreative1s.com
jcbefv63.com
itseasytodesign.com
tearsofthekingdomrecipes.com
huseyinata.xyz
clinicamuprodent.com
megacaraccessories.com
d9247.top
nhikhoaphucan.com
ufoporno.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3472-150-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3472-169-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4256-192-0x0000000000EC0000-0x0000000000EEF000-memory.dmp formbook behavioral2/memory/4256-202-0x0000000000EC0000-0x0000000000EEF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4020 set thread context of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 3472 set thread context of 780 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 59 PID 4256 set thread context of 780 4256 WWAHost.exe 59 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 2752 powershell.exe 2752 powershell.exe 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe 4256 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 780 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 4256 WWAHost.exe 4256 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 3472 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe Token: SeDebugPrivilege 4256 WWAHost.exe Token: SeShutdownPrivilege 780 Explorer.EXE Token: SeCreatePagefilePrivilege 780 Explorer.EXE Token: SeShutdownPrivilege 780 Explorer.EXE Token: SeCreatePagefilePrivilege 780 Explorer.EXE Token: SeShutdownPrivilege 780 Explorer.EXE Token: SeCreatePagefilePrivilege 780 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 780 Explorer.EXE 780 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2752 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 95 PID 4020 wrote to memory of 2752 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 95 PID 4020 wrote to memory of 2752 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 95 PID 4020 wrote to memory of 4228 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 97 PID 4020 wrote to memory of 4228 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 97 PID 4020 wrote to memory of 4228 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 97 PID 4020 wrote to memory of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 4020 wrote to memory of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 4020 wrote to memory of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 4020 wrote to memory of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 4020 wrote to memory of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 4020 wrote to memory of 3472 4020 UAE61 - 4510793563 - ALTAHER CHEM LLC.exe 99 PID 780 wrote to memory of 4256 780 Explorer.EXE 100 PID 780 wrote to memory of 4256 780 Explorer.EXE 100 PID 780 wrote to memory of 4256 780 Explorer.EXE 100 PID 4256 wrote to memory of 640 4256 WWAHost.exe 101 PID 4256 wrote to memory of 640 4256 WWAHost.exe 101 PID 4256 wrote to memory of 640 4256 WWAHost.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eetcYAaabIb.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eetcYAaabIb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF32A.tmp"3⤵
- Creates scheduled task(s)
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"3⤵PID:640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD52753a87e0852ab7c85603e9e8c6eb22e
SHA1940b63c9941b5c060b5bf56a79af67f1570f3b93
SHA256c1a94925efb296b1d5e3bb9d16b26cc18f1512c25244bbc28dbedc3c044c049e
SHA51206ccb05d06b145c92727415c1d1faea7bfc499eb0276857dfb5f0c1ebe063d0486b887a98acde7e6e6049d5dd178be4898326d5336ac69a3d0a15da64a2bd037