Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe
Resource
win7-20230831-en
General
-
Target
SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe
-
Size
576KB
-
MD5
1bebb72d1e9e14fe496ac6a0f248cccb
-
SHA1
97dc0a02f236b714db99227fd4565a40b08fc136
-
SHA256
851bc963ff7f1029f7495c537b2c4a34552dd60750e334cfaf237da398e6ea67
-
SHA512
e1353768e9591bad18776b1c56ce83fd6f1417e32421e64eda67a92e5e92fc4fa0f09a87eb9162412a70565b59309ab4c9220d1ac052feefc8a1e5d6d23e5a21
-
SSDEEP
12288:B/jNL4j/JuOst2aLW9PdMAn/bZibbNDxCWbV6YWEcI:BLNLU/UOUcZ/YxcW
Malware Config
Extracted
formbook
4.1
ey16
slimshotonline.com
rifaboa.com
metallzauber.com
jabandfuel.com
reacthat.com
qcgaeu.top
ssongg446.cfd
29kuan7.cfd
101agh.com
reliablii.com
luginfinity.com
e513.cloud
k4lantar.sbs
etoempire.com
phons.info
vovacom.com
birbakalim.fun
wellhousesctx.com
flthg.link
strasburgangus.com
warehouse-jobs-19432.bond
tisduallywheels.com
gbcontabilidade.com
nsyoiq.top
erlacx.xyz
graphic-design-degrees-us.xyz
therealopulent.com
genw.support
fmfo.asia
rrbookreviews.com
cirbs.com
afu-bf.net
northwesttheatreballet.com
koru.clinic
railway-tandoori.com
dumpsterrentalreading.com
73a73.com
ysudveg.buzz
y0rvragmr5.com
dataroomfiscale.com
jbfinishing.com
dcm393.com
nebulousharmony.bet
solaldesign.com
ssongg4323.cfd
rentingstudio.com
affiliatemarketingjoy.com
cvilleflowerfarm.com
huhubet505.com
bigpeople.top
casaalmafurniture.com
yccop.cfd
moviescoutt.com
wholemind.store
hvvwff.net
xn--srsz50dqxa5xb3rn52a.com
aunoption.com
zgtiku.com
jnbks.link
alqalamacademy.net
fly-destiny.com
servprowestpalm.com
itdev.life
paover.com
trsmine.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2560-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2560-30-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2860-37-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook behavioral1/memory/2860-39-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1636 set thread context of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 2560 set thread context of 1280 2560 RegSvcs.exe 22 PID 2860 set thread context of 1280 2860 NETSTAT.EXE 22 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2860 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2560 RegSvcs.exe 2560 RegSvcs.exe 2748 powershell.exe 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE 2860 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1280 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2560 RegSvcs.exe 2560 RegSvcs.exe 2560 RegSvcs.exe 2860 NETSTAT.EXE 2860 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2560 RegSvcs.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2860 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2748 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 28 PID 1636 wrote to memory of 2748 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 28 PID 1636 wrote to memory of 2748 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 28 PID 1636 wrote to memory of 2748 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 28 PID 1636 wrote to memory of 2660 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 30 PID 1636 wrote to memory of 2660 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 30 PID 1636 wrote to memory of 2660 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 30 PID 1636 wrote to memory of 2660 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 30 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1636 wrote to memory of 2560 1636 SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe 33 PID 1280 wrote to memory of 2860 1280 Explorer.EXE 35 PID 1280 wrote to memory of 2860 1280 Explorer.EXE 35 PID 1280 wrote to memory of 2860 1280 Explorer.EXE 35 PID 1280 wrote to memory of 2860 1280 Explorer.EXE 35 PID 2860 wrote to memory of 3024 2860 NETSTAT.EXE 36 PID 2860 wrote to memory of 3024 2860 NETSTAT.EXE 36 PID 2860 wrote to memory of 3024 2860 NETSTAT.EXE 36 PID 2860 wrote to memory of 3024 2860 NETSTAT.EXE 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ktImVdmWg.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ktImVdmWg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp"3⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e819ac90edd53b48d2d9093e1ff6fe4c
SHA19edd9d6c061c34f8cee8724ccc577067b4bfed56
SHA2560f914334f5965d8ec4b4f0c8bda97133788116ff530dc6aa78dccf3be0fa0644
SHA512b758dc8ae943a58e3e0723292ec9af4704288a3ebc6343d3938d444b8b2e43008995ab7b1370df4852170400d873a4816c566d5e59f982f63a190d188a4771f8