Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2acc48ac59c4d56bd7ac05e52cf1117d.exe
Resource
win7-20231129-en
General
-
Target
2acc48ac59c4d56bd7ac05e52cf1117d.exe
-
Size
1.1MB
-
MD5
2acc48ac59c4d56bd7ac05e52cf1117d
-
SHA1
ebfd27d0fd630d2212934a92ed30d66035ab16ee
-
SHA256
741e54e8d4c95d3a939bea610b4805e417a0662e17e5811aa72466d74f0fe9b4
-
SHA512
fcf2b00192f268fa31a071bf10306399b3450abab81899be34d89f74528c57c1507cdd52d98938d57489d664b87a2660fa3152acee36cb52428249bb7fce63a0
-
SSDEEP
24576:6lQ7oY8FYMblhBIgzqRDPzdzN543puwbmF:wQoyA1ZqrdKjm
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2020-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2020-23-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4860-30-0x00000000004A0000-0x00000000004CE000-memory.dmp formbook behavioral2/memory/4860-35-0x00000000004A0000-0x00000000004CE000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 2acc48ac59c4d56bd7ac05e52cf1117d.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4972 set thread context of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 2020 set thread context of 3488 2020 RegSvcs.exe 22 PID 4860 set thread context of 3488 4860 rundll32.exe 22 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2020 RegSvcs.exe 2020 RegSvcs.exe 2020 RegSvcs.exe 2020 RegSvcs.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe 4860 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2020 RegSvcs.exe 2020 RegSvcs.exe 2020 RegSvcs.exe 4860 rundll32.exe 4860 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2020 RegSvcs.exe Token: SeDebugPrivilege 4860 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1872 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 103 PID 4972 wrote to memory of 1872 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 103 PID 4972 wrote to memory of 1872 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 103 PID 4972 wrote to memory of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 4972 wrote to memory of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 4972 wrote to memory of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 4972 wrote to memory of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 4972 wrote to memory of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 4972 wrote to memory of 2020 4972 2acc48ac59c4d56bd7ac05e52cf1117d.exe 105 PID 3488 wrote to memory of 4860 3488 Explorer.EXE 106 PID 3488 wrote to memory of 4860 3488 Explorer.EXE 106 PID 3488 wrote to memory of 4860 3488 Explorer.EXE 106 PID 4860 wrote to memory of 2828 4860 rundll32.exe 107 PID 4860 wrote to memory of 2828 4860 rundll32.exe 107 PID 4860 wrote to memory of 2828 4860 rundll32.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\2acc48ac59c4d56bd7ac05e52cf1117d.exe"C:\Users\Admin\AppData\Local\Temp\2acc48ac59c4d56bd7ac05e52cf1117d.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ikCLfihlU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA9C8.tmp"3⤵
- Creates scheduled task(s)
PID:1872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5923651f4148c53b334f65ff72e7ade64
SHA1a5a1cc3b033621f15d84690c5105bf99c7cf9c63
SHA256271c4472028e3cdf7ca664cbb35c282ba31ff76843bed6537f700bf460d88788
SHA5120579905a0a7a4e74b6d9537727410e565650bbd9b44ca8d57c641aadfc68c853d262fd10ee99283e1b9c7515574d0aa81a1560c4dcecfe0d0f05e1c909193cbe