Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe
Resource
win7-20230831-en
General
-
Target
505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe
-
Size
327KB
-
MD5
625c3e1cb4694aeed2529c5a268e6f9f
-
SHA1
67c6d10114c18242ac0dc4653b40ad86063ed18f
-
SHA256
505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f
-
SHA512
ca1ed7532e02f40a1f2198319dd2aee18616d631b7ff7070d4c3caa95d5e60c14bf80257cd20ded883ccd6c24c83f0da25b72c3b4a221628191e8babd50205e7
-
SSDEEP
6144:/Ya6ftawQk/sEFeFtZrjBlplpAl8lmdWMQyTWaf8juupLGFberitGwXU8O:/YRtlQkjeFTPPWsmJQyTDXupLg5d5O
Malware Config
Extracted
formbook
4.1
hph0
sikisizlef.click
hottrendstore.com
aaroncordova.com
acemarketcommerce.com
connectdata.pro
wallerbrewery.com
kentos-nude.online
anlizhi.net
turismdelta.com
xgicloud.top
jahialo.com
warthercutlery.shop
wtlogryx.click
gbjyksm0czbki7.icu
sharmeventsplanner.com
plast.press
cyphersentinel.com
homes.credit
www11312011.com
rwalion.com
wwwfuddruckers.com
turkpinnup-se.click
bl-mall.xyz
dpworldtanzania.com
iloveall-inclusive.com
zqrrhmvsvl.top
empiremarketingassociates.com
bworks.dev
offline-energy.com
51xjjd.com
mobilerepportal.com
livesexcams19.com
dollarsymphony.com
poscatpiscis.com
soeasy777.net
exabeam.info
animanarrante.com
joliecuisinenatchez.com
nmmobiles.com
daikisuzuki-com.top
bb6aa.com
moversetobicoke.com
elektrai.com
zfast.com
originhub.net
pvcwindows.life
thepicklepantry.com
glowbeautysuncare.com
specmall.top
fun-now.com
sgh4k6g.xyz
bestelysium.com
adknanny.com
floridahomesnow.com
kacateringpersky.com
oregoncupping.clinic
tmdnfr.website
xiaolan1001.com
wenjing-yard.com
cryptoesports.pro
getcreditcard-au.bond
grcontemporaryart.com
analdudes.com
bestpriceddeals.com
memezon.net
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1884-7-0x0000000000500000-0x000000000052F000-memory.dmp formbook behavioral2/memory/1884-13-0x0000000000500000-0x000000000052F000-memory.dmp formbook behavioral2/memory/1080-18-0x0000000000870000-0x000000000089F000-memory.dmp formbook behavioral2/memory/1080-20-0x0000000000870000-0x000000000089F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 3192 cmqhhyi.exe 1884 cmqhhyi.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3192 set thread context of 1884 3192 cmqhhyi.exe 87 PID 1884 set thread context of 3196 1884 cmqhhyi.exe 41 PID 1080 set thread context of 3196 1080 cmstp.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1884 cmqhhyi.exe 1884 cmqhhyi.exe 1884 cmqhhyi.exe 1884 cmqhhyi.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe 1080 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3196 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3192 cmqhhyi.exe 3192 cmqhhyi.exe 1884 cmqhhyi.exe 1884 cmqhhyi.exe 1884 cmqhhyi.exe 1080 cmstp.exe 1080 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1884 cmqhhyi.exe Token: SeDebugPrivilege 1080 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3196 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3192 3708 505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe 86 PID 3708 wrote to memory of 3192 3708 505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe 86 PID 3708 wrote to memory of 3192 3708 505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe 86 PID 3192 wrote to memory of 1884 3192 cmqhhyi.exe 87 PID 3192 wrote to memory of 1884 3192 cmqhhyi.exe 87 PID 3192 wrote to memory of 1884 3192 cmqhhyi.exe 87 PID 3192 wrote to memory of 1884 3192 cmqhhyi.exe 87 PID 3196 wrote to memory of 1080 3196 Explorer.EXE 88 PID 3196 wrote to memory of 1080 3196 Explorer.EXE 88 PID 3196 wrote to memory of 1080 3196 Explorer.EXE 88 PID 1080 wrote to memory of 1212 1080 cmstp.exe 95 PID 1080 wrote to memory of 1212 1080 cmstp.exe 95 PID 1080 wrote to memory of 1212 1080 cmstp.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe"C:\Users\Admin\AppData\Local\Temp\505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"3⤵PID:1212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5975e35f60d24ec8c1f08e2afd6878054
SHA1a75b962a47b0ed82ca53db19e6821e3e62ae4f71
SHA2562302d58ed71c9dddb624f8903d95af9ab2881cf65acff319980c40195c25c326
SHA5123b969f89ed658e4ec3c1adb16b7564887985230021443e1124101c7a415ea401a4511203773240ee38cd23f62f4a3bb1d3e3f147f7eb68e33e6d31fd0c1dd6a0
-
Filesize
194KB
MD5975e35f60d24ec8c1f08e2afd6878054
SHA1a75b962a47b0ed82ca53db19e6821e3e62ae4f71
SHA2562302d58ed71c9dddb624f8903d95af9ab2881cf65acff319980c40195c25c326
SHA5123b969f89ed658e4ec3c1adb16b7564887985230021443e1124101c7a415ea401a4511203773240ee38cd23f62f4a3bb1d3e3f147f7eb68e33e6d31fd0c1dd6a0
-
Filesize
194KB
MD5975e35f60d24ec8c1f08e2afd6878054
SHA1a75b962a47b0ed82ca53db19e6821e3e62ae4f71
SHA2562302d58ed71c9dddb624f8903d95af9ab2881cf65acff319980c40195c25c326
SHA5123b969f89ed658e4ec3c1adb16b7564887985230021443e1124101c7a415ea401a4511203773240ee38cd23f62f4a3bb1d3e3f147f7eb68e33e6d31fd0c1dd6a0
-
Filesize
205KB
MD5be100c54c90efb0d588adeeb0281ede6
SHA101052c6a9a21bcd35803199fa79f6718504b9f41
SHA2563e13db99ad23d260f99d10a28faeade5c7e0aa22a98275226980d33f1726f469
SHA512542216be0796a4c40ae327b8ec01fb392ed7f887ab855e1edb8608fcf7b2a512a6a0d9247fc3f71512f7377c44d06cc2c9ddd2c1f7136d3976790643368625ec