Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe
Resource
win7-20240215-en
General
-
Target
f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe
-
Size
804KB
-
MD5
5caf11e8152e62b0390dfb238cf334fd
-
SHA1
1c421dfe825cd736208eba05e1f97949e1c31cb2
-
SHA256
f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0
-
SHA512
c5a0932c8fe7d3f60ccfd51951befe9513fa78fae65bb60b7494205713dbaa05e0cfd43d76aac3eb1f47cf73a2e8c66e51e9052dfefaa39a3af175de536d7f13
-
SSDEEP
12288:GstXkJgxtAg3ulQ882gHDrvWecYYx/vH4+WOuJuHO49NiaFmyVSJr6Wz:Gza3Ag3QQ88NjrvgDvXWluHn9NzC6o
Malware Config
Extracted
formbook
4.1
gy14
mavbam.com
theanhedonia.com
budgetnurseries.com
buflitr.com
alqamarhotel.com
2660348.top
123bu6.shop
v72999.com
yzyz841.xyz
247fracing.com
naples.beauty
twinklethrive.com
loscaseros.com
creditspisatylegko.site
sgyy3ej2dgwesb5.com
ufocafe.net
techn9nehollywoodundead.com
truedatalab.com
alterdpxlmarketing.com
harborspringsfire.com
soulheroes.online
tryscriptify.com
collline.com
tulisanemas.com
thelectricandsolar.com
jokergiftcard.buzz
sciencemediainstitute.com
loading-231412.info
ampsportss.com
dianetion.com
169cc.xyz
zezfhys.com
smnyg.com
elenorbet327.com
whatsapp1.autos
0854n5.shop
jxscols.top
camelpmkrf.com
myxtremecleanshq.services
beautyloungebydede.online
artbydianayorktownva.com
functional-yarns.com
accepted6.com
ug19bklo.com
roelofsen.online
batuoe.com
amiciperlacoda.com
883831.com
qieqyt.xyz
vendorato.online
6733633.com
stadtliche-arbeit.info
survivordental.com
mrbmed.com
elbt-ag.com
mtdiyx.xyz
mediayoki.site
zom11.com
biosif.com
aicashu.com
inovarevending.com
8x101n.xyz
ioherstrulybeauty.com
mosaica.online
venitro.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2596-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2596-25-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2784-35-0x00000000000A0000-0x00000000000CF000-memory.dmp formbook behavioral1/memory/2784-37-0x00000000000A0000-0x00000000000CF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exeRegSvcs.execontrol.exedescription pid process target process PID 3028 set thread context of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 2596 set thread context of 1200 2596 RegSvcs.exe Explorer.EXE PID 2784 set thread context of 1200 2784 control.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
RegSvcs.exepowershell.execontrol.exepid process 2596 RegSvcs.exe 2596 RegSvcs.exe 1168 powershell.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe 2784 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.execontrol.exepid process 2596 RegSvcs.exe 2596 RegSvcs.exe 2596 RegSvcs.exe 2784 control.exe 2784 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RegSvcs.exepowershell.execontrol.exedescription pid process Token: SeDebugPrivilege 2596 RegSvcs.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 2784 control.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exeExplorer.EXEcontrol.exedescription pid process target process PID 3028 wrote to memory of 1168 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe powershell.exe PID 3028 wrote to memory of 1168 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe powershell.exe PID 3028 wrote to memory of 1168 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe powershell.exe PID 3028 wrote to memory of 1168 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe powershell.exe PID 3028 wrote to memory of 2600 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe schtasks.exe PID 3028 wrote to memory of 2600 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe schtasks.exe PID 3028 wrote to memory of 2600 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe schtasks.exe PID 3028 wrote to memory of 2600 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe schtasks.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 3028 wrote to memory of 2596 3028 f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe RegSvcs.exe PID 1200 wrote to memory of 2784 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 2784 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 2784 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 2784 1200 Explorer.EXE control.exe PID 2784 wrote to memory of 1408 2784 control.exe cmd.exe PID 2784 wrote to memory of 1408 2784 control.exe cmd.exe PID 2784 wrote to memory of 1408 2784 control.exe cmd.exe PID 2784 wrote to memory of 1408 2784 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe"C:\Users\Admin\AppData\Local\Temp\f0164ec8c236a65046db19bb07dc24d20c7785bf1adc0823d89b568164dae9b0.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\leoCGEUNoE.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\leoCGEUNoE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5ABD.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5ABD.tmpFilesize
1KB
MD57dd2f0769adb44afe8bbf5865ff4e1f8
SHA1cd44c783de985dfcccc0d74da75d7de7c054054d
SHA256e6ae9a0d5792d180cfe1d50aa8a2503ddf39c2aceb35b36385205e854c447434
SHA512a9771ae8feb4cd0bac82c218e5c6ae62a1a61d9c97dd0321139445605ddfbd585a8b629fab7c33ea8a225feecfef9b5e7135cfeeccae22634965a6cc1c59a15d
-
memory/1168-31-0x0000000002AD0000-0x0000000002B10000-memory.dmpFilesize
256KB
-
memory/1168-23-0x000000006EFE0000-0x000000006F58B000-memory.dmpFilesize
5.7MB
-
memory/1168-24-0x000000006EFE0000-0x000000006F58B000-memory.dmpFilesize
5.7MB
-
memory/1168-32-0x000000006EFE0000-0x000000006F58B000-memory.dmpFilesize
5.7MB
-
memory/1168-26-0x0000000002AD0000-0x0000000002B10000-memory.dmpFilesize
256KB
-
memory/1168-29-0x0000000002AD0000-0x0000000002B10000-memory.dmpFilesize
256KB
-
memory/1200-22-0x0000000003150000-0x0000000003250000-memory.dmpFilesize
1024KB
-
memory/1200-28-0x00000000050E0000-0x0000000005242000-memory.dmpFilesize
1.4MB
-
memory/2596-30-0x0000000000AE0000-0x0000000000DE3000-memory.dmpFilesize
3.0MB
-
memory/2596-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2596-15-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2596-27-0x0000000000290000-0x00000000002A5000-memory.dmpFilesize
84KB
-
memory/2596-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2596-19-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2596-25-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2784-33-0x0000000000080000-0x000000000009F000-memory.dmpFilesize
124KB
-
memory/2784-37-0x00000000000A0000-0x00000000000CF000-memory.dmpFilesize
188KB
-
memory/2784-40-0x0000000000600000-0x0000000000694000-memory.dmpFilesize
592KB
-
memory/2784-36-0x0000000002000000-0x0000000002303000-memory.dmpFilesize
3.0MB
-
memory/2784-35-0x00000000000A0000-0x00000000000CF000-memory.dmpFilesize
188KB
-
memory/2784-34-0x0000000000080000-0x000000000009F000-memory.dmpFilesize
124KB
-
memory/3028-1-0x0000000074BB0000-0x000000007529E000-memory.dmpFilesize
6.9MB
-
memory/3028-5-0x0000000004DC0000-0x0000000004E2E000-memory.dmpFilesize
440KB
-
memory/3028-0-0x00000000003B0000-0x0000000000480000-memory.dmpFilesize
832KB
-
memory/3028-2-0x0000000001E90000-0x0000000001ED0000-memory.dmpFilesize
256KB
-
memory/3028-4-0x0000000000830000-0x000000000083E000-memory.dmpFilesize
56KB
-
memory/3028-20-0x0000000074BB0000-0x000000007529E000-memory.dmpFilesize
6.9MB
-
memory/3028-3-0x0000000000390000-0x00000000003A6000-memory.dmpFilesize
88KB