Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 05:06
Static task
static1
General
-
Target
860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe
-
Size
332KB
-
MD5
5b691330acaa3c5432b9caadbeb82003
-
SHA1
7084d84dcc45be8161bc3c044c02d02f05d46b95
-
SHA256
860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930
-
SHA512
dd8fb100e9d3b3d7404265c400ff1d055fc31d07f6359cfe95902045f9f48e3ca348ccce3071bc00bcca7f39a1073df45ea79381b81d697aafe6ff2ea7c765c4
-
SSDEEP
6144:BBlL/51hWPefvD4kFdshzsQ1tmlwOctCRUDkBYz:HHTfvD4kqsQel5IZF
Malware Config
Extracted
formbook
4.1
tb8i
097jz.com
physium.net
sherwoodsubnet.com
scbaya.fun
us2048.top
danlclmn.com
starsyx.com
foxbox-digi.store
thefishermanhouse.com
salvanandcie.com
rykuruh.cfd
gelaoguan.net
petar-gojun.com
coandcompanyboutique.com
decentralizedcryptos.com
ecuajet.net
livbythebeach.com
cleaning-services-33235.bond
free-webbuilder.today
pussypower.net
tron-pk.xyz
heirvaeh.com
9129z18.com
0x0audits.top
gpoinad.com
texwwfrx.com
bonusurunler.online
babytoy-deals.com
8onlyfans.com
farmermapa.net
vallishealth.com
tiyu116.net
driftlessmenofthewoods.com
jaliyahsboutique.site
hillandvalley.wine
funlifeday.net
kmrcounselling.online
rolandofrias.online
6632k.vip
reporttask.online
99dd88.buzz
bradleymartinfitness.com
superflowers.pro
startaxeindhoven.com
districonsumohome.com
wombancircle.com
gdtanhua.icu
strikkzone.com
otismc.net
dataxmesh.com
assosolico.net
grataballi.com
geigenbau-duesseldorf.com
freightlizards.com
sololinkliving.com
hecticgame.com
stx.lat
cleanfood.bio
ismprojects.net
reillyleet.com
socialise.biz
collaco.info
genevalakeagent.com
drivefta.com
free-indeed.faith
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2788-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2788-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3092-18-0x00000000005C0000-0x00000000005EF000-memory.dmp formbook behavioral1/memory/3092-20-0x00000000005C0000-0x00000000005EF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 4228 cegsxx.exe 2788 cegsxx.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4228 set thread context of 2788 4228 cegsxx.exe 87 PID 2788 set thread context of 3260 2788 cegsxx.exe 37 PID 3092 set thread context of 3260 3092 cscript.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 cegsxx.exe 2788 cegsxx.exe 2788 cegsxx.exe 2788 cegsxx.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe 3092 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3260 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4228 cegsxx.exe 2788 cegsxx.exe 2788 cegsxx.exe 2788 cegsxx.exe 3092 cscript.exe 3092 cscript.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2788 cegsxx.exe Token: SeDebugPrivilege 3092 cscript.exe Token: SeManageVolumePrivilege 3364 svchost.exe Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE Token: SeShutdownPrivilege 3260 Explorer.EXE Token: SeCreatePagefilePrivilege 3260 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3260 Explorer.EXE 3260 Explorer.EXE 3260 Explorer.EXE 3260 Explorer.EXE 3260 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3260 Explorer.EXE 3260 Explorer.EXE 3260 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3260 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4228 4408 860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe 85 PID 4408 wrote to memory of 4228 4408 860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe 85 PID 4408 wrote to memory of 4228 4408 860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe 85 PID 4228 wrote to memory of 2788 4228 cegsxx.exe 87 PID 4228 wrote to memory of 2788 4228 cegsxx.exe 87 PID 4228 wrote to memory of 2788 4228 cegsxx.exe 87 PID 4228 wrote to memory of 2788 4228 cegsxx.exe 87 PID 3260 wrote to memory of 3092 3260 Explorer.EXE 88 PID 3260 wrote to memory of 3092 3260 Explorer.EXE 88 PID 3260 wrote to memory of 3092 3260 Explorer.EXE 88 PID 3092 wrote to memory of 4816 3092 cscript.exe 89 PID 3092 wrote to memory of 4816 3092 cscript.exe 89 PID 3092 wrote to memory of 4816 3092 cscript.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe"C:\Users\Admin\AppData\Local\Temp\860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"3⤵PID:4816
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1492
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD54cc7f41cd478adeb7e50928e4644d132
SHA1a47777dd6d684c8883333e9a3233839b0cd56165
SHA256b08a7a092590402f05a5f6211aab0e7ceb63965e5f50bb622725fc5e97bc1040
SHA512d8e97b09caabd8451c58d724c217f63c33dd83d60767e14ab5f943a4dc700b9b9a3a23ec2a2611150ea3903e871a708f2234208cbd5500c4bc7458494061be40
-
Filesize
176KB
MD50a1743cf9e74100a9fd023acf3f36e49
SHA14a7d1c28ccb0ae96ed074466ad1bdd22a2d36457
SHA2565491e80a096d5f370f010e69d9aba77eb3ab49f8a259dea544106a7f4f7aad74
SHA5129b4ce1bddbb32ce7fa4916cd6d7616fc9016234e4a6cfe7ddb97ffb42f5da8000dbdf5c709e0046036d72ae481c10268504243a8b09582d80845b10868aafea4
-
Filesize
176KB
MD50a1743cf9e74100a9fd023acf3f36e49
SHA14a7d1c28ccb0ae96ed074466ad1bdd22a2d36457
SHA2565491e80a096d5f370f010e69d9aba77eb3ab49f8a259dea544106a7f4f7aad74
SHA5129b4ce1bddbb32ce7fa4916cd6d7616fc9016234e4a6cfe7ddb97ffb42f5da8000dbdf5c709e0046036d72ae481c10268504243a8b09582d80845b10868aafea4
-
Filesize
176KB
MD50a1743cf9e74100a9fd023acf3f36e49
SHA14a7d1c28ccb0ae96ed074466ad1bdd22a2d36457
SHA2565491e80a096d5f370f010e69d9aba77eb3ab49f8a259dea544106a7f4f7aad74
SHA5129b4ce1bddbb32ce7fa4916cd6d7616fc9016234e4a6cfe7ddb97ffb42f5da8000dbdf5c709e0046036d72ae481c10268504243a8b09582d80845b10868aafea4
-
Filesize
205KB
MD594c1de70f3399bfbb9a75c90f80cb147
SHA1058d4d73ba9a02ba877be7664f159c3be08a4331
SHA2561db2947c6a53bb241df0b2d3fe158a3ec6fd418f8cd77b6041b8c77e520248d3
SHA5129bde301e2a4d0b06a9efe7c3e87a34f094de17ea871e4025a3b2c1e8d3221884afa3dfb917578eb66bf074b34d29d5cec9c7da099dd65986ab7e18009758f2e2