Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe
Resource
win7-20240319-en
General
-
Target
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe
-
Size
652KB
-
MD5
26a38af05a6bdd23f047eb65fee67251
-
SHA1
61633e621f7d7cdcca5936b27a18cfe7e5169aae
-
SHA256
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a
-
SHA512
7d852f05e4377b77691c3c7517609b6bd12c96d0c5dfe0bb330974ff891731529c12da9a7d52ea0f4e526fd35ce35237bfe40d2099afc12f59e58f95157e16b9
-
SSDEEP
12288:JCTYHa5WHBh2Izs6vHhIlvyuq7it546mz2p9:QTYNHU6vHKlvU7ij46mKp
Malware Config
Extracted
formbook
4.1
hy07
katemclaughl.in
worthyofficial.com
digitopia.click
ledmee.com
siwaasnz.life
ba-y.com
specifiedbuild.com
abandoned-houses-pt-0.bond
yesxoit.xyz
onlinemehrgeld.com
gosysamergoods.com
speakdontell.com
brokenequipmentsolutions.online
gruppofebi.cloud
adilosk.shop
supplierpartnerportal.com
wizov.dev
fast-homeinsurance.com
j88.vote
onamaevn.com
smartbatteryshunt.com
alivo-solutions-inc.net
qdcn16qy.shop
enmawholesale.com
experiencemedia.xyz
shoeloyalty.com
wylderosehealingarts.com
m-1263bets10.com
blanks.page
postcase.site
guangxiav.com
vitlrecruiting.info
go-re.one
rutie.net
donielss.com
hitwin.world
poshplaybliss.com
used-cars-25479.bond
riadanil.com
evrenfayans.xyz
cleopatraselixirs.com
beyondcarbon.xyz
pornimmersion.site
f8serial.site
theoriginals.farm
pvindustriesbv.com
santofantasy.shop
gosignkochava.com
akabox.net
valentinesteddyshop.com
closedealsin90days.com
goodsharbor.com
cbdmarkettrends.com
theartsincarter.com
massivedgeagency.website
totthoit.com
o0qqj7jm.shop
morningcallcoffeestandnola.com
51236.loan
omniahorizon.shop
hellasicks.com
soundbiscuitmusic.net
racerace2024.com
9yywk4.site
de-cosmeticenhancement.today
Signatures
-
Detects executables packed with SmartAssembly 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3896-7-0x0000000006DE0000-0x0000000006DEC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2696-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exedescription pid process target process PID 3896 set thread context of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exepowershell.exe3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exepid process 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 2272 powershell.exe 2696 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 2696 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 2272 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exepowershell.exedescription pid process Token: SeDebugPrivilege 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe Token: SeDebugPrivilege 2272 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exedescription pid process target process PID 3896 wrote to memory of 2272 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe powershell.exe PID 3896 wrote to memory of 2272 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe powershell.exe PID 3896 wrote to memory of 2272 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe powershell.exe PID 3896 wrote to memory of 1072 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe schtasks.exe PID 3896 wrote to memory of 1072 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe schtasks.exe PID 3896 wrote to memory of 1072 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe schtasks.exe PID 3896 wrote to memory of 4028 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 4028 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 4028 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2368 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2368 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2368 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 3956 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 3956 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 3956 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe PID 3896 wrote to memory of 2696 3896 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe 3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wIJCOfiF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wIJCOfiF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C42.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"C:\Users\Admin\AppData\Local\Temp\3bd968f2cff76757eb1bf75e19e8302ef97417c65ce9c0accf578eafae435c6a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tutu1l3m.cqi.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp8C42.tmpFilesize
1KB
MD53443de31389eb53f707cc8d4786f70f2
SHA16ac811634348044306d9f0337eb0ac2f9cdff917
SHA2569866fe3ba2d756a312667c2296127684c81d3b92d5a6beb0ad17f210919661b9
SHA512f96d648706616cd0c2d3ae95390dec8addd09ee2359cef762a801851517f5a82646508fc9b1fc12e156f78766ec6d02dbca439b8458c3af1c15999dc2a09d293
-
memory/2272-31-0x0000000006270000-0x00000000062D6000-memory.dmpFilesize
408KB
-
memory/2272-55-0x0000000007BA0000-0x0000000007BBA000-memory.dmpFilesize
104KB
-
memory/2272-68-0x00000000744B0000-0x0000000074C60000-memory.dmpFilesize
7.7MB
-
memory/2272-36-0x00000000064E0000-0x0000000006834000-memory.dmpFilesize
3.3MB
-
memory/2272-64-0x0000000007F00000-0x0000000007F1A000-memory.dmpFilesize
104KB
-
memory/2272-63-0x0000000007E00000-0x0000000007E14000-memory.dmpFilesize
80KB
-
memory/2272-62-0x0000000007DF0000-0x0000000007DFE000-memory.dmpFilesize
56KB
-
memory/2272-61-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/2272-14-0x0000000002F80000-0x0000000002FB6000-memory.dmpFilesize
216KB
-
memory/2272-60-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/2272-16-0x00000000744B0000-0x0000000074C60000-memory.dmpFilesize
7.7MB
-
memory/2272-18-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/2272-17-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/2272-20-0x0000000005AC0000-0x00000000060E8000-memory.dmpFilesize
6.2MB
-
memory/2272-59-0x0000000007DC0000-0x0000000007DD1000-memory.dmpFilesize
68KB
-
memory/2272-37-0x00000000055F0000-0x000000000560E000-memory.dmpFilesize
120KB
-
memory/2272-58-0x00000000744B0000-0x0000000074C60000-memory.dmpFilesize
7.7MB
-
memory/2272-24-0x00000000060F0000-0x0000000006112000-memory.dmpFilesize
136KB
-
memory/2272-57-0x0000000007E40000-0x0000000007ED6000-memory.dmpFilesize
600KB
-
memory/2272-30-0x0000000006190000-0x00000000061F6000-memory.dmpFilesize
408KB
-
memory/2272-65-0x0000000007EE0000-0x0000000007EE8000-memory.dmpFilesize
32KB
-
memory/2272-56-0x0000000007C10000-0x0000000007C1A000-memory.dmpFilesize
40KB
-
memory/2272-54-0x00000000081E0000-0x000000000885A000-memory.dmpFilesize
6.5MB
-
memory/2272-38-0x0000000006930000-0x000000000697C000-memory.dmpFilesize
304KB
-
memory/2272-39-0x0000000003030000-0x0000000003040000-memory.dmpFilesize
64KB
-
memory/2272-40-0x000000007EFA0000-0x000000007EFB0000-memory.dmpFilesize
64KB
-
memory/2272-41-0x0000000006EA0000-0x0000000006ED2000-memory.dmpFilesize
200KB
-
memory/2272-42-0x0000000070D70000-0x0000000070DBC000-memory.dmpFilesize
304KB
-
memory/2272-52-0x0000000006E60000-0x0000000006E7E000-memory.dmpFilesize
120KB
-
memory/2272-53-0x0000000007890000-0x0000000007933000-memory.dmpFilesize
652KB
-
memory/2696-23-0x00000000012F0000-0x000000000163A000-memory.dmpFilesize
3.3MB
-
memory/2696-19-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3896-1-0x00000000009F0000-0x0000000000A98000-memory.dmpFilesize
672KB
-
memory/3896-2-0x0000000005B30000-0x00000000060D4000-memory.dmpFilesize
5.6MB
-
memory/3896-5-0x0000000005530000-0x000000000553A000-memory.dmpFilesize
40KB
-
memory/3896-22-0x00000000744B0000-0x0000000074C60000-memory.dmpFilesize
7.7MB
-
memory/3896-3-0x0000000005490000-0x0000000005522000-memory.dmpFilesize
584KB
-
memory/3896-7-0x0000000006DE0000-0x0000000006DEC000-memory.dmpFilesize
48KB
-
memory/3896-8-0x00000000070E0000-0x0000000007156000-memory.dmpFilesize
472KB
-
memory/3896-9-0x0000000009750000-0x00000000097EC000-memory.dmpFilesize
624KB
-
memory/3896-6-0x0000000005820000-0x0000000005832000-memory.dmpFilesize
72KB
-
memory/3896-0-0x00000000744B0000-0x0000000074C60000-memory.dmpFilesize
7.7MB
-
memory/3896-4-0x00000000030F0000-0x0000000003100000-memory.dmpFilesize
64KB