Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 07:15
Static task
static1
Behavioral task
behavioral1
Sample
5a8637cc62a5884edc586b690d0bac10.exe
Resource
win7-20230712-en
General
-
Target
5a8637cc62a5884edc586b690d0bac10.exe
-
Size
598KB
-
MD5
5a8637cc62a5884edc586b690d0bac10
-
SHA1
33ff0da34d35ef8051d5c88641502ee7bf2f0333
-
SHA256
54d08c079e162698607d24a232cc8b51ea0cecf8df1d6fefa27726041e2cd366
-
SHA512
818ea5ef21b7bb392cdd17bd9f0878cf1caa27d1d5a0e1fd8d05a22da73f3cf0859a97b0ad7ea0bc17ef8b83fba2eb93322b79a607676861abc308182db1764f
-
SSDEEP
12288:BsniF9L2hCugpGy1Md/VmA01Z0/ROPRfxzIZp+kD/etaJedzY+GG:BsniKhjo1K/V01ZKRWPEX+K/jJed0+r
Malware Config
Extracted
formbook
4.1
oi24
sorterexpo.com
50imty.xyz
biscotrucking.com
urawep.xyz
parthaviorganic.com
quali-con.com
wgimawmo.click
19829e.com
wendywardband.com
peraepin.com
wintercot.com
cqfvnzlk.click
furar.top
fcvorbww.click
gazetarendaextra.com
bakerstack.com
plant-nursery-boweco.com
30235p.com
sartensaludable.com
dalmatiangarden.com
makeitmakesensemedia.com
thedinkablecollection.com
advanainc.com
riverlatte.com
body-for-living.com
the-worst-people-ever.com
nukimodulistica.com
wvwvw.link
fh700e.com
evenntlifetoday-bn.net
chupinhui.net
bpknews.online
10510ydx.click
whippoorwillmile.com
boiselocalguide.info
rgngn.site
oppenheimermovies.com
dekile.com
pianowithryan.com
fvbh024.xyz
duranautodetail.com
gobitc.com
giftedcover.space
unxrnaki.click
nomadirealestate.com
wtbwys.beauty
dentidentalclinic.website
hom-yy.com
diont-sp.biz
devel-forge.com
teleiosmiami.com
ra89.info
copperstatenotary.com
iammb.icu
gamblezen.casino
eenen.icu
prizedetailing.com
miamibikereport.com
tigerny.online
75958.site
serenitymediacontrol.com
cartaimage.com
file00.store
mackellers.com
tokahp.app
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2984-152-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5a8637cc62a5884edc586b690d0bac10.exedescription pid process target process PID 1088 set thread context of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
5a8637cc62a5884edc586b690d0bac10.exepowershell.exe5a8637cc62a5884edc586b690d0bac10.exepid process 1088 5a8637cc62a5884edc586b690d0bac10.exe 1088 5a8637cc62a5884edc586b690d0bac10.exe 3268 powershell.exe 2984 5a8637cc62a5884edc586b690d0bac10.exe 2984 5a8637cc62a5884edc586b690d0bac10.exe 3268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5a8637cc62a5884edc586b690d0bac10.exepowershell.exedescription pid process Token: SeDebugPrivilege 1088 5a8637cc62a5884edc586b690d0bac10.exe Token: SeDebugPrivilege 3268 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5a8637cc62a5884edc586b690d0bac10.exedescription pid process target process PID 1088 wrote to memory of 3268 1088 5a8637cc62a5884edc586b690d0bac10.exe powershell.exe PID 1088 wrote to memory of 3268 1088 5a8637cc62a5884edc586b690d0bac10.exe powershell.exe PID 1088 wrote to memory of 3268 1088 5a8637cc62a5884edc586b690d0bac10.exe powershell.exe PID 1088 wrote to memory of 3472 1088 5a8637cc62a5884edc586b690d0bac10.exe schtasks.exe PID 1088 wrote to memory of 3472 1088 5a8637cc62a5884edc586b690d0bac10.exe schtasks.exe PID 1088 wrote to memory of 3472 1088 5a8637cc62a5884edc586b690d0bac10.exe schtasks.exe PID 1088 wrote to memory of 3252 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 3252 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 3252 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe PID 1088 wrote to memory of 2984 1088 5a8637cc62a5884edc586b690d0bac10.exe 5a8637cc62a5884edc586b690d0bac10.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8637cc62a5884edc586b690d0bac10.exe"C:\Users\Admin\AppData\Local\Temp\5a8637cc62a5884edc586b690d0bac10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NRGdELGVSZiWc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NRGdELGVSZiWc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1940.tmp"2⤵
- Creates scheduled task(s)
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\5a8637cc62a5884edc586b690d0bac10.exe"C:\Users\Admin\AppData\Local\Temp\5a8637cc62a5884edc586b690d0bac10.exe"2⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\5a8637cc62a5884edc586b690d0bac10.exe"C:\Users\Admin\AppData\Local\Temp\5a8637cc62a5884edc586b690d0bac10.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5cfb81e1c7dcdffbfdc427fa409e56112
SHA1786cfe8bcb18a13e3a9f42cc7075105f9802c884
SHA256daa367cfb2e95a453dd13923429691cd06ee24e53f07d8bbd627305eb336342c
SHA5123f663ed09638017acb1a458daef266aa7351d76d9ee8cf75f7367c27772ece0114514092447bc76b1c5f1691192e7d749cf1793f579564e0c41dc45b7ec01cca