Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
37c2f744f5c480d0b4bf96c78da15dfb.exe
Resource
win7-20231215-en
General
-
Target
37c2f744f5c480d0b4bf96c78da15dfb.exe
-
Size
760KB
-
MD5
37c2f744f5c480d0b4bf96c78da15dfb
-
SHA1
1626c779d458416a559f95ac5d21b62aba381ae0
-
SHA256
ab2f8c8398a0233c6d9b0308b3499e7cababf65a1ec913c4a88c895edaa822c7
-
SHA512
a2571c4ee5f0c3c662ef529fee2b5c528a95075944781bc6e6c4aaa98fd991ef41a6f29bfc2728518de39354da656fed6558c48d8ea10510963541d995bd9956
-
SSDEEP
12288:rWSZjnSnDs/65nfND/2Iokna8XAp2sixvMWBRF:runDs/6VNL2IoBaEW
Malware Config
Extracted
formbook
4.1
vd9n
theunwrappedcollective.com
seckj-ic.com
tyresandover.com
thetrophyworld.com
fonggrconstruction.com
hopiproject.com
sktitle.com
charlotteobscurer.com
qjuhe.com
girlzglitter.com
createmylawn.com
hempcbgpill.com
zzdfdzkj.com
shreehariessential.com
226sm.com
getcupscall.com
neuralviolin.com
sanskaar.life
xn--fhqrm54yyukopc.com
togetherx4fantasy5star.today
buyonlinesaree.com
percyshandman.site
hatchethangout.com
rugpat.com
zen-gizmo.com
vipmomali.com
lacerasavall.cat
aqueouso.com
mkolgems.com
sevenhundredseventysix.fund
fotografhannaneret.com
mitravy.com
bmtrans.net
linterpreting.com
izquay.com
sawaturkey.com
marche-maman.com
eemygf.com
animenovel.com
travelssimply.com
montecitobutterfly.com
volebahis.com
daniela.red
ramseyedk12.com
leyterealestate.info
patriotstrong.net
vkgcrew.com
nadhiradeebaazkiya.online
hotelcarre.com
myfabulouscollection.com
stellantis-luxury-rent.com
hn2020.xyz
emilyscopes.com
lotosouq.com
lovecord.date
stconstant.online
volkite-culverin.net
allwaysautism.com
sheisnatashasimone.com
sepantaceram.com
ishopgrady.com
lifestorycard.com
sexybbwavailable.website
domainbaycapital.com
constructioncleanup.pro
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2144-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2144-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1184-28-0x0000000000C30000-0x0000000000C5E000-memory.dmp formbook behavioral2/memory/1184-34-0x0000000000C30000-0x0000000000C5E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 37c2f744f5c480d0b4bf96c78da15dfb.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4984 set thread context of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 2144 set thread context of 3560 2144 RegSvcs.exe 46 PID 1184 set thread context of 3560 1184 wlanext.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 2144 RegSvcs.exe 2144 RegSvcs.exe 2144 RegSvcs.exe 2144 RegSvcs.exe 2144 RegSvcs.exe 2144 RegSvcs.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe 1184 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2144 RegSvcs.exe 2144 RegSvcs.exe 2144 RegSvcs.exe 1184 wlanext.exe 1184 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe Token: SeDebugPrivilege 2144 RegSvcs.exe Token: SeDebugPrivilege 1184 wlanext.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3560 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1692 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 103 PID 4984 wrote to memory of 1692 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 103 PID 4984 wrote to memory of 1692 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 103 PID 4984 wrote to memory of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 4984 wrote to memory of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 4984 wrote to memory of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 4984 wrote to memory of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 4984 wrote to memory of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 4984 wrote to memory of 2144 4984 37c2f744f5c480d0b4bf96c78da15dfb.exe 105 PID 3560 wrote to memory of 1184 3560 Explorer.EXE 106 PID 3560 wrote to memory of 1184 3560 Explorer.EXE 106 PID 3560 wrote to memory of 1184 3560 Explorer.EXE 106 PID 1184 wrote to memory of 3056 1184 wlanext.exe 107 PID 1184 wrote to memory of 3056 1184 wlanext.exe 107 PID 1184 wrote to memory of 3056 1184 wlanext.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\37c2f744f5c480d0b4bf96c78da15dfb.exe"C:\Users\Admin\AppData\Local\Temp\37c2f744f5c480d0b4bf96c78da15dfb.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LtkyJzyTd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp53C8.tmp"3⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3056
-
-