Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
cd0f9f8e285dc698ec134a65cb519bf9.exe
Resource
win7-20240220-en
General
-
Target
cd0f9f8e285dc698ec134a65cb519bf9.exe
-
Size
477KB
-
MD5
cd0f9f8e285dc698ec134a65cb519bf9
-
SHA1
8e1772b29b049782e2df7b81facca92428aaeda6
-
SHA256
861da69934b91448a3336cb1202ede93466a5bea352da087a703823af581bc0c
-
SHA512
ac55ef9b7e0c4482f1816cce77039ec43453172d12f96faaf6591114bfbbb4d68318e9f3b9c07ce44950b5a429d902e5cce49edcd4f510fa7545c6a210a4d76b
-
SSDEEP
6144:+JzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbh3:+JY1ja4qQ+rcbFudkuN/S/1MSSPQcHK1
Malware Config
Extracted
formbook
3.9
fr
geturstuff.life
kisakollections.com
bkipmtahuna.com
aoxou.com
thebigandfreeupdates.download
utvtribe.com
icontoken.com
naturexperience.com
h2sentertainmentcafe.com
careerproresumepa.com
franchiseindia.directory
psychouniversity.com
traveng.com
mylifestylebyclem.com
greentmraelty.com
imoneg.com
lupusrebelacademy.com
ghqxc.info
lylulidbd.com
dalfreestyle.com
cloudinerd.com
nexuscero.com
teacherqiu.com
thegotore.com
xn--uj1aq81b.ink
aj7u52.com
livingbcnarea.com
olbst.com
rane.ltd
awesomecoopervip.com
kxmdq.com
mamahux.info
mailserverlayer.net
livelearnheal.net
faizki.com
myclarabella.com
adxcreative.net
becomeoneevents.com
village-gabarrier.com
portablestations.com
routerlogin.tips
news3038.ltd
joyfashionclothes.com
wzlghb.com
boxcleversashwindows.com
mikesquickdeals4u.com
lossensuales.com
carinsurancequotesowc.info
hapuo.com
brandongallups.com
preloadmypc.com
nbmimc.com
zengerfarm.com
microfibrebeachtowel.com
runamokproductions.com
bjtaiyan.com
depressiontalks.com
rememberaways.info
xionolif.world
988qipaiq.com
bzlouti.com
candidofleitas.com
arnieslonglifetea.com
xbelief.com
smaleg.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4020-19-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4020-25-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/2156-30-0x0000000000960000-0x000000000098A000-memory.dmp formbook behavioral2/memory/2156-36-0x0000000000960000-0x000000000098A000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cd0f9f8e285dc698ec134a65cb519bf9.exe -
Executes dropped EXE 2 IoCs
pid Process 2868 syscheck.exe 4020 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmgr = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2868 set thread context of 4020 2868 syscheck.exe 113 PID 4020 set thread context of 3440 4020 syscheck.exe 57 PID 2156 set thread context of 3440 2156 cmmon32.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4020 syscheck.exe 4020 syscheck.exe 4020 syscheck.exe 4020 syscheck.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe 2156 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4020 syscheck.exe 4020 syscheck.exe 4020 syscheck.exe 2156 cmmon32.exe 2156 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe Token: SeDebugPrivilege 2868 syscheck.exe Token: SeDebugPrivilege 4020 syscheck.exe Token: SeDebugPrivilege 2156 cmmon32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4464 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe 105 PID 4700 wrote to memory of 4464 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe 105 PID 4700 wrote to memory of 4464 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe 105 PID 4700 wrote to memory of 116 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe 109 PID 4700 wrote to memory of 116 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe 109 PID 4700 wrote to memory of 116 4700 cd0f9f8e285dc698ec134a65cb519bf9.exe 109 PID 116 wrote to memory of 2868 116 cmd.exe 111 PID 116 wrote to memory of 2868 116 cmd.exe 111 PID 116 wrote to memory of 2868 116 cmd.exe 111 PID 2868 wrote to memory of 4020 2868 syscheck.exe 113 PID 2868 wrote to memory of 4020 2868 syscheck.exe 113 PID 2868 wrote to memory of 4020 2868 syscheck.exe 113 PID 2868 wrote to memory of 4020 2868 syscheck.exe 113 PID 2868 wrote to memory of 4020 2868 syscheck.exe 113 PID 2868 wrote to memory of 4020 2868 syscheck.exe 113 PID 3440 wrote to memory of 2156 3440 Explorer.EXE 114 PID 3440 wrote to memory of 2156 3440 Explorer.EXE 114 PID 3440 wrote to memory of 2156 3440 Explorer.EXE 114 PID 2156 wrote to memory of 4652 2156 cmmon32.exe 115 PID 2156 wrote to memory of 4652 2156 cmmon32.exe 115 PID 2156 wrote to memory of 4652 2156 cmmon32.exe 115
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\cd0f9f8e285dc698ec134a65cb519bf9.exe"C:\Users\Admin\AppData\Local\Temp\cd0f9f8e285dc698ec134a65cb519bf9.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\cd0f9f8e285dc698ec134a65cb519bf9.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:4464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:4652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5cd0f9f8e285dc698ec134a65cb519bf9
SHA18e1772b29b049782e2df7b81facca92428aaeda6
SHA256861da69934b91448a3336cb1202ede93466a5bea352da087a703823af581bc0c
SHA512ac55ef9b7e0c4482f1816cce77039ec43453172d12f96faaf6591114bfbbb4d68318e9f3b9c07ce44950b5a429d902e5cce49edcd4f510fa7545c6a210a4d76b