Analysis
-
max time kernel
170s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
e08cc96789886667def8d2d72520d25f.exe
Resource
win7-20240221-en
General
-
Target
e08cc96789886667def8d2d72520d25f.exe
-
Size
477KB
-
MD5
e08cc96789886667def8d2d72520d25f
-
SHA1
cb7764cbd49da01a6b66553644fb3e84c70669d7
-
SHA256
9ededd53a7b7f060dd6c315331fe8bd20c5c69d4dfe6ca1346b55405731381b6
-
SHA512
7a49c1527307a81a9f6e04b02911bcae1da00d29e5110c76585132db5a657ba35ffa1fa32e6a100a6b7c5ad880b5a9453eb96f3bad527bc076571eb0b918f88f
-
SSDEEP
6144:SJzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbhp:SJY1ja4qQ+rcbFudkuN/S/1MSSPQcHKP
Malware Config
Extracted
formbook
3.9
fr
geturstuff.life
kisakollections.com
bkipmtahuna.com
aoxou.com
thebigandfreeupdates.download
utvtribe.com
icontoken.com
naturexperience.com
h2sentertainmentcafe.com
careerproresumepa.com
franchiseindia.directory
psychouniversity.com
traveng.com
mylifestylebyclem.com
greentmraelty.com
imoneg.com
lupusrebelacademy.com
ghqxc.info
lylulidbd.com
dalfreestyle.com
cloudinerd.com
nexuscero.com
teacherqiu.com
thegotore.com
xn--uj1aq81b.ink
aj7u52.com
livingbcnarea.com
olbst.com
rane.ltd
awesomecoopervip.com
kxmdq.com
mamahux.info
mailserverlayer.net
livelearnheal.net
faizki.com
myclarabella.com
adxcreative.net
becomeoneevents.com
village-gabarrier.com
portablestations.com
routerlogin.tips
news3038.ltd
joyfashionclothes.com
wzlghb.com
boxcleversashwindows.com
mikesquickdeals4u.com
lossensuales.com
carinsurancequotesowc.info
hapuo.com
brandongallups.com
preloadmypc.com
nbmimc.com
zengerfarm.com
microfibrebeachtowel.com
runamokproductions.com
bjtaiyan.com
depressiontalks.com
rememberaways.info
xionolif.world
988qipaiq.com
bzlouti.com
candidofleitas.com
arnieslonglifetea.com
xbelief.com
smaleg.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2028-20-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/2028-26-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4184-32-0x0000000000480000-0x00000000004AA000-memory.dmp formbook behavioral2/memory/4184-38-0x0000000000480000-0x00000000004AA000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e08cc96789886667def8d2d72520d25f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation e08cc96789886667def8d2d72520d25f.exe -
Executes dropped EXE 2 IoCs
Processes:
syscheck.exesyscheck.exepid process 524 syscheck.exe 2028 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
syscheck.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmgr = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
syscheck.exesyscheck.exewlanext.exedescription pid process target process PID 524 set thread context of 2028 524 syscheck.exe syscheck.exe PID 2028 set thread context of 3320 2028 syscheck.exe Explorer.EXE PID 4184 set thread context of 3320 4184 wlanext.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
wlanext.exedescription ioc process File opened for modification C:\Program Files (x86)\Bmlg46tv0\user-zt.exe wlanext.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
syscheck.exewlanext.exepid process 2028 syscheck.exe 2028 syscheck.exe 2028 syscheck.exe 2028 syscheck.exe 2028 syscheck.exe 2028 syscheck.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe 4184 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
syscheck.exewlanext.exepid process 2028 syscheck.exe 2028 syscheck.exe 2028 syscheck.exe 4184 wlanext.exe 4184 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
e08cc96789886667def8d2d72520d25f.exesyscheck.exesyscheck.exewlanext.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2180 e08cc96789886667def8d2d72520d25f.exe Token: SeDebugPrivilege 524 syscheck.exe Token: SeDebugPrivilege 2028 syscheck.exe Token: SeDebugPrivilege 4184 wlanext.exe Token: SeShutdownPrivilege 3320 Explorer.EXE Token: SeCreatePagefilePrivilege 3320 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
e08cc96789886667def8d2d72520d25f.execmd.exesyscheck.exeExplorer.EXEwlanext.exedescription pid process target process PID 2180 wrote to memory of 2464 2180 e08cc96789886667def8d2d72520d25f.exe cmd.exe PID 2180 wrote to memory of 2464 2180 e08cc96789886667def8d2d72520d25f.exe cmd.exe PID 2180 wrote to memory of 2464 2180 e08cc96789886667def8d2d72520d25f.exe cmd.exe PID 2180 wrote to memory of 4456 2180 e08cc96789886667def8d2d72520d25f.exe cmd.exe PID 2180 wrote to memory of 4456 2180 e08cc96789886667def8d2d72520d25f.exe cmd.exe PID 2180 wrote to memory of 4456 2180 e08cc96789886667def8d2d72520d25f.exe cmd.exe PID 4456 wrote to memory of 524 4456 cmd.exe syscheck.exe PID 4456 wrote to memory of 524 4456 cmd.exe syscheck.exe PID 4456 wrote to memory of 524 4456 cmd.exe syscheck.exe PID 524 wrote to memory of 2028 524 syscheck.exe syscheck.exe PID 524 wrote to memory of 2028 524 syscheck.exe syscheck.exe PID 524 wrote to memory of 2028 524 syscheck.exe syscheck.exe PID 524 wrote to memory of 2028 524 syscheck.exe syscheck.exe PID 524 wrote to memory of 2028 524 syscheck.exe syscheck.exe PID 524 wrote to memory of 2028 524 syscheck.exe syscheck.exe PID 3320 wrote to memory of 4184 3320 Explorer.EXE wlanext.exe PID 3320 wrote to memory of 4184 3320 Explorer.EXE wlanext.exe PID 3320 wrote to memory of 4184 3320 Explorer.EXE wlanext.exe PID 4184 wrote to memory of 2876 4184 wlanext.exe cmd.exe PID 4184 wrote to memory of 2876 4184 wlanext.exe cmd.exe PID 4184 wrote to memory of 2876 4184 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e08cc96789886667def8d2d72520d25f.exe"C:\Users\Admin\AppData\Local\Temp\e08cc96789886667def8d2d72520d25f.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\e08cc96789886667def8d2d72520d25f.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\syscheck.exeFilesize
477KB
MD5e08cc96789886667def8d2d72520d25f
SHA1cb7764cbd49da01a6b66553644fb3e84c70669d7
SHA2569ededd53a7b7f060dd6c315331fe8bd20c5c69d4dfe6ca1346b55405731381b6
SHA5127a49c1527307a81a9f6e04b02911bcae1da00d29e5110c76585132db5a657ba35ffa1fa32e6a100a6b7c5ad880b5a9453eb96f3bad527bc076571eb0b918f88f
-
memory/524-17-0x0000000074CE0000-0x0000000075490000-memory.dmpFilesize
7.7MB
-
memory/524-23-0x0000000074CE0000-0x0000000075490000-memory.dmpFilesize
7.7MB
-
memory/524-19-0x0000000005AD0000-0x0000000005B6C000-memory.dmpFilesize
624KB
-
memory/524-18-0x0000000004DF0000-0x0000000004E00000-memory.dmpFilesize
64KB
-
memory/524-14-0x0000000074CE0000-0x0000000075490000-memory.dmpFilesize
7.7MB
-
memory/524-15-0x0000000004DF0000-0x0000000004E00000-memory.dmpFilesize
64KB
-
memory/2028-27-0x0000000000B90000-0x0000000000BA4000-memory.dmpFilesize
80KB
-
memory/2028-26-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2028-24-0x00000000010A0000-0x00000000013EA000-memory.dmpFilesize
3.3MB
-
memory/2028-20-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/2180-9-0x00000000059E0000-0x00000000059F0000-memory.dmpFilesize
64KB
-
memory/2180-16-0x0000000074CE0000-0x0000000075490000-memory.dmpFilesize
7.7MB
-
memory/2180-0-0x0000000000DC0000-0x0000000000E3E000-memory.dmpFilesize
504KB
-
memory/2180-8-0x0000000074CE0000-0x0000000075490000-memory.dmpFilesize
7.7MB
-
memory/2180-5-0x00000000059E0000-0x00000000059F0000-memory.dmpFilesize
64KB
-
memory/2180-4-0x0000000005800000-0x000000000581C000-memory.dmpFilesize
112KB
-
memory/2180-3-0x0000000005820000-0x00000000058B2000-memory.dmpFilesize
584KB
-
memory/2180-2-0x0000000005EE0000-0x0000000006484000-memory.dmpFilesize
5.6MB
-
memory/2180-1-0x0000000074CE0000-0x0000000075490000-memory.dmpFilesize
7.7MB
-
memory/3320-28-0x0000000008E80000-0x0000000008FA7000-memory.dmpFilesize
1.2MB
-
memory/3320-36-0x0000000008E80000-0x0000000008FA7000-memory.dmpFilesize
1.2MB
-
memory/3320-39-0x0000000009020000-0x000000000913A000-memory.dmpFilesize
1.1MB
-
memory/3320-40-0x0000000009020000-0x000000000913A000-memory.dmpFilesize
1.1MB
-
memory/4184-29-0x0000000000900000-0x0000000000917000-memory.dmpFilesize
92KB
-
memory/4184-31-0x0000000000900000-0x0000000000917000-memory.dmpFilesize
92KB
-
memory/4184-32-0x0000000000480000-0x00000000004AA000-memory.dmpFilesize
168KB
-
memory/4184-33-0x0000000000C80000-0x0000000000FCA000-memory.dmpFilesize
3.3MB
-
memory/4184-34-0x00000000009F0000-0x0000000000A83000-memory.dmpFilesize
588KB
-
memory/4184-38-0x0000000000480000-0x00000000004AA000-memory.dmpFilesize
168KB