Analysis
-
max time kernel
159s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
z2______________________________.exe
Resource
win7-20231215-en
General
-
Target
z2______________________________.exe
-
Size
605KB
-
MD5
cd8edca1396524d51a71ca38b7f5273f
-
SHA1
d8a092cd9c6d4034e1dae4c850169e38ba46ff7b
-
SHA256
1d5692148172354fedfed8e9e8f368a59a8c2c6372c7885e80087d9ba5ad76c1
-
SHA512
921c1e74fe46209a20515c7c31bbb972d671e691ddb204d5ba0c69d8ebdd2030eeac2a267db067d0157751e2e11cce3fc68bbab79406e671f255528ad8b310d0
-
SSDEEP
12288:5ekeQ5vziy6BQgKPZn3HB78Ujj0nGDRql6w2lgHiKeee9JMALH/6V6Cs2:5ekriy6CzB3CnGo/CKeee9J1S
Malware Config
Extracted
formbook
4.1
gy14
mavbam.com
theanhedonia.com
budgetnurseries.com
buflitr.com
alqamarhotel.com
2660348.top
123bu6.shop
v72999.com
yzyz841.xyz
247fracing.com
naples.beauty
twinklethrive.com
loscaseros.com
creditspisatylegko.site
sgyy3ej2dgwesb5.com
ufocafe.net
techn9nehollywoodundead.com
truedatalab.com
alterdpxlmarketing.com
harborspringsfire.com
soulheroes.online
tryscriptify.com
collline.com
tulisanemas.com
thelectricandsolar.com
jokergiftcard.buzz
sciencemediainstitute.com
loading-231412.info
ampsportss.com
dianetion.com
169cc.xyz
zezfhys.com
smnyg.com
elenorbet327.com
whatsapp1.autos
0854n5.shop
jxscols.top
camelpmkrf.com
myxtremecleanshq.services
beautyloungebydede.online
artbydianayorktownva.com
functional-yarns.com
accepted6.com
ug19bklo.com
roelofsen.online
batuoe.com
amiciperlacoda.com
883831.com
qieqyt.xyz
vendorato.online
6733633.com
stadtliche-arbeit.info
survivordental.com
mrbmed.com
elbt-ag.com
mtdiyx.xyz
mediayoki.site
zom11.com
biosif.com
aicashu.com
inovarevending.com
8x101n.xyz
ioherstrulybeauty.com
mosaica.online
venitro.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2740-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2740-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/524-31-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook behavioral1/memory/524-33-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2032 set thread context of 2740 2032 z2______________________________.exe 31 PID 2740 set thread context of 1200 2740 RegSvcs.exe 14 PID 524 set thread context of 1200 524 cmd.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2032 z2______________________________.exe 2032 z2______________________________.exe 2740 RegSvcs.exe 2740 RegSvcs.exe 2212 powershell.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe 524 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2740 RegSvcs.exe 2740 RegSvcs.exe 2740 RegSvcs.exe 524 cmd.exe 524 cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2032 z2______________________________.exe Token: SeDebugPrivilege 2740 RegSvcs.exe Token: SeDebugPrivilege 2212 powershell.exe Token: SeDebugPrivilege 524 cmd.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2212 2032 z2______________________________.exe 29 PID 2032 wrote to memory of 2212 2032 z2______________________________.exe 29 PID 2032 wrote to memory of 2212 2032 z2______________________________.exe 29 PID 2032 wrote to memory of 2212 2032 z2______________________________.exe 29 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 2032 wrote to memory of 2740 2032 z2______________________________.exe 31 PID 1200 wrote to memory of 524 1200 Explorer.EXE 32 PID 1200 wrote to memory of 524 1200 Explorer.EXE 32 PID 1200 wrote to memory of 524 1200 Explorer.EXE 32 PID 1200 wrote to memory of 524 1200 Explorer.EXE 32 PID 524 wrote to memory of 1612 524 cmd.exe 33 PID 524 wrote to memory of 1612 524 cmd.exe 33 PID 524 wrote to memory of 1612 524 cmd.exe 33 PID 524 wrote to memory of 1612 524 cmd.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\z2______________________________.exe"C:\Users\Admin\AppData\Local\Temp\z2______________________________.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\z2______________________________.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1612
-
-