Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:44
Static task
static1
Behavioral task
behavioral1
Sample
2338b2d93f5edfcd74f9f3d4d543a667.exe
Resource
win7-20231215-en
General
-
Target
2338b2d93f5edfcd74f9f3d4d543a667.exe
-
Size
483KB
-
MD5
2338b2d93f5edfcd74f9f3d4d543a667
-
SHA1
21f87eb8272297c0dbc13026d30911d753b7d2b8
-
SHA256
2a5e63caa90e0386f4de9972913c19cf1f0f33ac5a86e007cbdc84092df12420
-
SHA512
64bd950047f9fbb4f5544e72316ffcaa63df6dec31c4280f57992c20b04fc7f20f06e359c89e6f1993ae6bc5b9b385a23739f3a3e65fdaa10c28bb59d07cc6a3
-
SSDEEP
6144:OIFhuSYWFYgrKsUc3y2WnO1xzcWmZXe2rkwnbo60T21BOcCSrYDEgfje5ig1ef9b:zh8Mz+sv3y2N1xzAZprkmuN/SD5iKefJ
Malware Config
Extracted
formbook
3.9
ow
piavecaffe.com
jlxkqg.men
lifesavingfoundation.net
karadasama.net
michaeltraolach-macsweeney.com
thunderwatches.com
serviciocasawhirlpool.biz
c-cap.online
itparksolution.com
clarityhearingkw.com
wpgrosiri.date
colemarshalcambell.com
webperffest.com
adjusterforirma.info
buildersqq.com
spiritualwisdominindia.com
111222333.net
traditionalarabicdishes.com
hmlifi.com
receive-our-info-heredaily.info
whitecoins.info
woodiesrattlers.com
www8458l.com
fifanie.com
xn--qrq721bqkkzt3b.net
mesquiteleaffarm.com
xn--30-yo3c105l5jn.com
imaginaryfair.com
dawnanddusted.com
youeronline.com
alyssabrandonportfolio.com
winhealthalert.info
fithappenseveryday.com
3dreplicant.net
exiaomaipu.com
billsmockupdomain.com
radicalmiddleusa.com
fatblastingsupplements.com
okvidaoapp.com
1024eees.info
gdbaisu.com
soluciones-libres.com
guansaidingzhi.com
francesca-lynagh.com
airbodycare.com
atlutes.com
learningtolaughintherain.com
zology-tek.com
bjlmzk.com
watchinglass.com
belltowerhealthcare.com
gaetvr.men
xn--j7q21wggj81l.net
photos4lyfe.net
paisaghat.com
repairextend.win
lifesciencescareers.com
bazar-199.com
timepieceluxury.com
wizeater.com
itdui.com
johnshookgp.com
lesderniers.com
goodsystemforupdates.review
cybep.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2868-25-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2868-30-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/1860-35-0x00000000000F0000-0x000000000011A000-memory.dmp formbook behavioral1/memory/1860-42-0x00000000000F0000-0x000000000011A000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
syscheck.exesyscheck.exepid process 2436 syscheck.exe 2868 syscheck.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exesyscheck.exepid process 2972 cmd.exe 2436 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
syscheck.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
syscheck.exesyscheck.execmstp.exedescription pid process target process PID 2436 set thread context of 2868 2436 syscheck.exe syscheck.exe PID 2868 set thread context of 1240 2868 syscheck.exe Explorer.EXE PID 1860 set thread context of 1240 1860 cmstp.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
syscheck.execmstp.exepid process 2868 syscheck.exe 2868 syscheck.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe 1860 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
syscheck.execmstp.exepid process 2868 syscheck.exe 2868 syscheck.exe 2868 syscheck.exe 1860 cmstp.exe 1860 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
2338b2d93f5edfcd74f9f3d4d543a667.exesyscheck.exesyscheck.execmstp.exedescription pid process Token: SeDebugPrivilege 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe Token: SeDebugPrivilege 2436 syscheck.exe Token: SeDebugPrivilege 2868 syscheck.exe Token: SeDebugPrivilege 1860 cmstp.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
2338b2d93f5edfcd74f9f3d4d543a667.execmd.exesyscheck.exeExplorer.EXEcmstp.exedescription pid process target process PID 1784 wrote to memory of 2760 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2760 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2760 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2760 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2972 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2972 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2972 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 1784 wrote to memory of 2972 1784 2338b2d93f5edfcd74f9f3d4d543a667.exe cmd.exe PID 2972 wrote to memory of 2436 2972 cmd.exe syscheck.exe PID 2972 wrote to memory of 2436 2972 cmd.exe syscheck.exe PID 2972 wrote to memory of 2436 2972 cmd.exe syscheck.exe PID 2972 wrote to memory of 2436 2972 cmd.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 2436 wrote to memory of 2868 2436 syscheck.exe syscheck.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1240 wrote to memory of 1860 1240 Explorer.EXE cmstp.exe PID 1860 wrote to memory of 2004 1860 cmstp.exe cmd.exe PID 1860 wrote to memory of 2004 1860 cmstp.exe cmd.exe PID 1860 wrote to memory of 2004 1860 cmstp.exe cmd.exe PID 1860 wrote to memory of 2004 1860 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2338b2d93f5edfcd74f9f3d4d543a667.exe"C:\Users\Admin\AppData\Local\Temp\2338b2d93f5edfcd74f9f3d4d543a667.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\2338b2d93f5edfcd74f9f3d4d543a667.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\syscheck.exeFilesize
483KB
MD52338b2d93f5edfcd74f9f3d4d543a667
SHA121f87eb8272297c0dbc13026d30911d753b7d2b8
SHA2562a5e63caa90e0386f4de9972913c19cf1f0f33ac5a86e007cbdc84092df12420
SHA51264bd950047f9fbb4f5544e72316ffcaa63df6dec31c4280f57992c20b04fc7f20f06e359c89e6f1993ae6bc5b9b385a23739f3a3e65fdaa10c28bb59d07cc6a3
-
memory/1240-32-0x0000000006120000-0x00000000062C5000-memory.dmpFilesize
1.6MB
-
memory/1240-40-0x0000000006120000-0x00000000062C5000-memory.dmpFilesize
1.6MB
-
memory/1784-0-0x0000000000370000-0x00000000003EE000-memory.dmpFilesize
504KB
-
memory/1784-1-0x0000000073F70000-0x000000007465E000-memory.dmpFilesize
6.9MB
-
memory/1784-2-0x0000000000660000-0x000000000067C000-memory.dmpFilesize
112KB
-
memory/1784-3-0x0000000001F30000-0x0000000001F70000-memory.dmpFilesize
256KB
-
memory/1784-6-0x0000000073F70000-0x000000007465E000-memory.dmpFilesize
6.9MB
-
memory/1784-7-0x0000000001F30000-0x0000000001F70000-memory.dmpFilesize
256KB
-
memory/1784-10-0x0000000073F70000-0x000000007465E000-memory.dmpFilesize
6.9MB
-
memory/1860-42-0x00000000000F0000-0x000000000011A000-memory.dmpFilesize
168KB
-
memory/1860-33-0x0000000000FA0000-0x0000000000FB8000-memory.dmpFilesize
96KB
-
memory/1860-38-0x00000000008B0000-0x0000000000943000-memory.dmpFilesize
588KB
-
memory/1860-36-0x00000000009C0000-0x0000000000CC3000-memory.dmpFilesize
3.0MB
-
memory/1860-35-0x00000000000F0000-0x000000000011A000-memory.dmpFilesize
168KB
-
memory/1860-34-0x0000000000FA0000-0x0000000000FB8000-memory.dmpFilesize
96KB
-
memory/2436-15-0x0000000073880000-0x0000000073F6E000-memory.dmpFilesize
6.9MB
-
memory/2436-16-0x0000000004B10000-0x0000000004B50000-memory.dmpFilesize
256KB
-
memory/2436-18-0x0000000004B10000-0x0000000004B50000-memory.dmpFilesize
256KB
-
memory/2436-14-0x0000000004B10000-0x0000000004B50000-memory.dmpFilesize
256KB
-
memory/2436-12-0x0000000000F40000-0x0000000000FBE000-memory.dmpFilesize
504KB
-
memory/2436-27-0x0000000073880000-0x0000000073F6E000-memory.dmpFilesize
6.9MB
-
memory/2436-13-0x0000000073880000-0x0000000073F6E000-memory.dmpFilesize
6.9MB
-
memory/2868-19-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2868-30-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2868-31-0x0000000000190000-0x00000000001A4000-memory.dmpFilesize
80KB
-
memory/2868-28-0x0000000000A40000-0x0000000000D43000-memory.dmpFilesize
3.0MB
-
memory/2868-25-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2868-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2868-21-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB