Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
tmp3laph0nn.exe
Resource
win7-20231215-en
General
-
Target
tmp3laph0nn.exe
-
Size
606KB
-
MD5
2fa129c7224ce25ad5f60e88eec7b371
-
SHA1
e1942614c29c0c060c0ccbda2f798a894bcd4a9c
-
SHA256
f754f346d15cc240a990e20e92ab7bd1a0193543aef5b5fc5562306e2593ed5f
-
SHA512
3969e7a0bebfa1a4fe955a3314f16b152f0d6b317656543dd7f9abd3a45b44dbe190ae419ad0580c42e8317b5d422c5693aac4be8e4efd4f460254ebb8ac9b3c
-
SSDEEP
12288:2tKPYyVFvf7ckA4aS4reE3w5uRbah33bw4CbKgXdDo8pfFH2HytA:24g+Foi6wAK30nbhV2i
Malware Config
Extracted
formbook
4.1
pf06
mogu829.store
kjhcvjbjer.asia
kokombeverage.com
spaycrop.com
pennsylvaniaautosales.com
cqdjyw.com
attendlimitlessarena.com
dominicbyrd.com
dkds.net
ematransform.com
faceshopping.one
iqmal.dev
ivanrgonzalez.com
ickfullmoon.com
dirtyshirtspro.com
stopinflationtax.com
sidbaskaran.com
szroadtech.com
clickvenda.store
cckkkl.com
room2revel.com
sartecsoftware.com
countwithai.com
kk520.ltd
eightoptions.com
snakckyhut.com
fanfling.com
eastafricainvestmentscorp.com
house-market-80771.bond
malwarerisk.com
gadanang.com
hgasx.xyz
1lzt3.cfd
jhix.asia
3uyici0828d024.com
1xqizi.top
trinitytruckingalliancellc.com
bepadercommerce.shop
xc558.top
290805.online
expertavel.com
copiumden.com
iprsadvisors.com
ixcstx.top
drucillapraised7037.top
meetcaldentalarts.com
vkplants.com
timonareh.net
web5wallets.com
43551896.com
getdatasembly.com
fjtt.site
atcorpglobal.com
bx1.site
vfi315.com
gjapk.cfd
legacyphotofilm.online
colourbash.tech
enchantresscharms.link
44444x.cyou
securityniche.com
salesparkcrm.com
gagaluaa7.pro
nikefreak34.com
ssongg4184.cfd
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/3236-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3236-40-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1616-48-0x0000000000E00000-0x0000000000E2F000-memory.dmp formbook behavioral2/memory/1616-71-0x0000000000E00000-0x0000000000E2F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation tmp3laph0nn.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3680 set thread context of 3236 3680 tmp3laph0nn.exe 105 PID 3236 set thread context of 3512 3236 tmp3laph0nn.exe 57 PID 1616 set thread context of 3512 1616 wscript.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3752 powershell.exe 3752 powershell.exe 3236 tmp3laph0nn.exe 3236 tmp3laph0nn.exe 3236 tmp3laph0nn.exe 3236 tmp3laph0nn.exe 3752 powershell.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe 1616 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3236 tmp3laph0nn.exe 3236 tmp3laph0nn.exe 3236 tmp3laph0nn.exe 1616 wscript.exe 1616 wscript.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 3236 tmp3laph0nn.exe Token: SeDebugPrivilege 1616 wscript.exe Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3512 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3752 3680 tmp3laph0nn.exe 101 PID 3680 wrote to memory of 3752 3680 tmp3laph0nn.exe 101 PID 3680 wrote to memory of 3752 3680 tmp3laph0nn.exe 101 PID 3680 wrote to memory of 2144 3680 tmp3laph0nn.exe 103 PID 3680 wrote to memory of 2144 3680 tmp3laph0nn.exe 103 PID 3680 wrote to memory of 2144 3680 tmp3laph0nn.exe 103 PID 3680 wrote to memory of 3236 3680 tmp3laph0nn.exe 105 PID 3680 wrote to memory of 3236 3680 tmp3laph0nn.exe 105 PID 3680 wrote to memory of 3236 3680 tmp3laph0nn.exe 105 PID 3680 wrote to memory of 3236 3680 tmp3laph0nn.exe 105 PID 3680 wrote to memory of 3236 3680 tmp3laph0nn.exe 105 PID 3680 wrote to memory of 3236 3680 tmp3laph0nn.exe 105 PID 3512 wrote to memory of 1616 3512 Explorer.EXE 107 PID 3512 wrote to memory of 1616 3512 Explorer.EXE 107 PID 3512 wrote to memory of 1616 3512 Explorer.EXE 107 PID 1616 wrote to memory of 4272 1616 wscript.exe 114 PID 1616 wrote to memory of 4272 1616 wscript.exe 114 PID 1616 wrote to memory of 4272 1616 wscript.exe 114
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\cJceVmCU.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cJceVmCU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp245C.tmp"3⤵
- Creates scheduled task(s)
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"3⤵PID:4272
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2868
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1860
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e99c8753f4a8342b90923d6b506e963b
SHA16c009a04decdeb0d549d6af2f7792f0bd278d647
SHA25683646ff87c98a7c9ae062d41ae6175a9a4d76fe69454a91bdef202cb7c107955
SHA5120981e24ee7ae8278797349645646da221824f3dfcaa213b523751f60c25ca97db3798d5af5a1e20f2e3a0c820eecadf6f28b3b553675fa48c40107572e235925