Overview
overview
10Static
static
101.exe
windows7-x64
31221.exe
windows7-x64
106b282d34fv2.exe
windows7-x64
1B000CEF.exe
windows7-x64
10Builder.exe
windows7-x64
1POVOFJYqCo...Iu.exe
windows7-x64
1Terracotta.exe
windows7-x64
1TerracottaGUI.exe
windows7-x64
1Zver.exe
windows7-x64
3a.exe
windows7-x64
10amdcontroller.exe
windows7-x64
10bg.exe
windows7-x64
1bin.exe
windows7-x64
10bin2.exe
windows7-x64
7ej.exe
windows7-x64
10fban4.exe
windows7-x64
7glash.exe
windows7-x64
1johngotovo (2).exe
windows7-x64
10johngotovo...al.exe
windows7-x64
10ktg.exe
windows7-x64
1otIXAOPqOV...LX.exe
windows7-x64
3scvsots.exe
windows7-x64
10setup.exe
windows7-x64
1shit.exe
windows7-x64
10ss.exe
windows7-x64
10stealedd517v2.exe
windows7-x64
1steel.exe
windows7-x64
1ted.exe
windows7-x64
1update_b.exe
windows7-x64
1update_z.exe
windows7-x64
1uyo.exe
windows7-x64
1v72d8z2.exe
windows7-x64
1Analysis
-
max time kernel
44s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13-08-2023 18:33
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1221.exe
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
6b282d34fv2.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
B000CEF.exe
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
Builder.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
POVOFJYqCoZfOoPkWOsSBcVYWIu.exe
Resource
win7-20230712-en
Behavioral task
behavioral7
Sample
Terracotta.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
TerracottaGUI.exe
Resource
win7-20230712-en
Behavioral task
behavioral9
Sample
Zver.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
a.exe
Resource
win7-20230712-en
Behavioral task
behavioral11
Sample
amdcontroller.exe
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
bg.exe
Resource
win7-20230712-en
Behavioral task
behavioral13
Sample
bin.exe
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
bin2.exe
Resource
win7-20230712-en
Behavioral task
behavioral15
Sample
ej.exe
Resource
win7-20230712-en
Behavioral task
behavioral16
Sample
fban4.exe
Resource
win7-20230712-en
Behavioral task
behavioral17
Sample
glash.exe
Resource
win7-20230712-en
Behavioral task
behavioral18
Sample
johngotovo (2).exe
Resource
win7-20230712-en
Behavioral task
behavioral19
Sample
johngotovo (2)_original_original.exe
Resource
win7-20230712-en
Behavioral task
behavioral20
Sample
ktg.exe
Resource
win7-20230712-en
Behavioral task
behavioral21
Sample
otIXAOPqOVgvIKePlwFQLX.exe
Resource
win7-20230712-en
Behavioral task
behavioral22
Sample
scvsots.exe
Resource
win7-20230712-en
Behavioral task
behavioral23
Sample
setup.exe
Resource
win7-20230712-en
Behavioral task
behavioral24
Sample
shit.exe
Resource
win7-20230712-en
Behavioral task
behavioral25
Sample
ss.exe
Resource
win7-20230712-en
Behavioral task
behavioral26
Sample
stealedd517v2.exe
Resource
win7-20230712-en
Behavioral task
behavioral27
Sample
steel.exe
Resource
win7-20230712-en
Behavioral task
behavioral28
Sample
ted.exe
Resource
win7-20230712-en
Behavioral task
behavioral29
Sample
update_b.exe
Resource
win7-20230712-en
Behavioral task
behavioral30
Sample
update_z.exe
Resource
win7-20230712-en
Behavioral task
behavioral31
Sample
uyo.exe
Resource
win7-20230712-en
Behavioral task
behavioral32
Sample
v72d8z2.exe
Resource
win7-20230712-en
General
-
Target
bin.exe
-
Size
167KB
-
MD5
efb72c1ec0608a79de8bd3ee79c0bad2
-
SHA1
b7ca0fde5e0b4e86d5f7f66defd9c20fbbd2ba23
-
SHA256
a78a59d1d3598c29e0bfba14bb0ca09a2263f7e60af88cd09a85ee39272bcf79
-
SHA512
31e720486a325d89e7f80193b9ed37298c50a9cc1dc34d112c8c6ec6e421590fac4284daa98c49f91ac5b3b6b3bec230d58e1f58f0fa9f47ba150f724365198b
-
SSDEEP
3072:16VXCc3/7KNo2ymzGLo3Kh4zVVBYDPhSkrKjQSKT55oGUFCy:Mj/03zG86KzVVBYDJSAK0T4GUb
Malware Config
Extracted
formbook
3.8
da
chainwalkchambers.com
foxyhaul.com
yetisnackdesigns.com
paleodiettips.xyz
51zxsf.com
jisulianxiufu.com
qianbianyun.com
unitedresponders.info
contentlab.video
traveloyunnan.com
tonybehrenslaw.com
adithyafuels.com
huanayule.net
conscious-cross.com
link2register.com
anchoritis.com
vicente20.com
jnmbc.info
m-1944.com
naap-tol.com
cakedupweed.com
banhxeyhoc.com
gci-explorer.com
pinsentmasonsbda.com
walt-app.com
mingkanhui.com
mygeniekart.com
stawarrior.com
meneldur.win
324sdaf.com
flatlinepublications.com
bcgdigitalmarketing.com
kissantrees.com
annotader.com
agvstl.men
pnzqn.com
helpfixsf.city
kumawatart.com
pharmersbrand.net
iphone-10.support
hiworld.biz
zimbersale.com
ghostsspread.com
jevington-forensicsolutions.com
loubilab.com
barriosdemdeo.com
abenchbythewindow.com
goingthroughitaly.com
hewlettpackardsavings.com
chinatupian.com
silverudio.net
r4hubynw9bc.biz
saiyo-jecc-net.com
meiwasns.com
propelev8.com
duke4u.com
mashahir-elearning.com
aliinfluencer.com
ukano-ryu.com
aichankang.com
pddcall.com
askvest.com
mbclighthouse.com
xezu.ltd
solabentvx.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral13/memory/2080-55-0x0000000000E00000-0x0000000000E2A000-memory.dmp formbook behavioral13/memory/1872-61-0x00000000000D0000-0x00000000000FA000-memory.dmp formbook behavioral13/memory/1872-66-0x00000000000D0000-0x00000000000FA000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2940 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bin.execmstp.exedescription pid process target process PID 2080 set thread context of 1272 2080 bin.exe Explorer.EXE PID 1872 set thread context of 1272 1872 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
bin.execmstp.exepid process 2080 bin.exe 2080 bin.exe 1872 cmstp.exe 1872 cmstp.exe 1872 cmstp.exe 1872 cmstp.exe 1872 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1272 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
bin.execmstp.exepid process 2080 bin.exe 2080 bin.exe 2080 bin.exe 1872 cmstp.exe 1872 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bin.execmstp.exedescription pid process Token: SeDebugPrivilege 2080 bin.exe Token: SeDebugPrivilege 1872 cmstp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
Explorer.EXEcmstp.exedescription pid process target process PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1272 wrote to memory of 1872 1272 Explorer.EXE cmstp.exe PID 1872 wrote to memory of 2940 1872 cmstp.exe cmd.exe PID 1872 wrote to memory of 2940 1872 cmstp.exe cmd.exe PID 1872 wrote to memory of 2940 1872 cmstp.exe cmd.exe PID 1872 wrote to memory of 2940 1872 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1272-63-0x00000000045A0000-0x000000000466F000-memory.dmpFilesize
828KB
-
memory/1272-56-0x0000000000010000-0x0000000000020000-memory.dmpFilesize
64KB
-
memory/1272-70-0x0000000006AD0000-0x0000000006BFE000-memory.dmpFilesize
1.2MB
-
memory/1272-68-0x0000000006AD0000-0x0000000006BFE000-memory.dmpFilesize
1.2MB
-
memory/1272-58-0x00000000045A0000-0x000000000466F000-memory.dmpFilesize
828KB
-
memory/1272-67-0x0000000006AD0000-0x0000000006BFE000-memory.dmpFilesize
1.2MB
-
memory/1872-60-0x0000000000FE0000-0x0000000000FF8000-memory.dmpFilesize
96KB
-
memory/1872-61-0x00000000000D0000-0x00000000000FA000-memory.dmpFilesize
168KB
-
memory/1872-62-0x0000000000B90000-0x0000000000E93000-memory.dmpFilesize
3.0MB
-
memory/1872-65-0x0000000000960000-0x00000000009F3000-memory.dmpFilesize
588KB
-
memory/1872-66-0x00000000000D0000-0x00000000000FA000-memory.dmpFilesize
168KB
-
memory/1872-59-0x0000000000FE0000-0x0000000000FF8000-memory.dmpFilesize
96KB
-
memory/2080-54-0x0000000000A70000-0x0000000000D73000-memory.dmpFilesize
3.0MB
-
memory/2080-57-0x0000000000190000-0x00000000001A4000-memory.dmpFilesize
80KB
-
memory/2080-55-0x0000000000E00000-0x0000000000E2A000-memory.dmpFilesize
168KB