Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
LF2024022.exe
Resource
win7-20240221-en
General
-
Target
LF2024022.exe
-
Size
629KB
-
MD5
027ac6bf381a0b5d842c137e2240624c
-
SHA1
6cb5e6d9d7eb76993064c8b36465fcd47fc14d11
-
SHA256
a5a473bc3d643ce300b72af75ae8f7a0d47ee983f1160707606ef9e818bb1a2f
-
SHA512
404b3cf245b4b8634844fa9428a101b1cb86e6d8c76b9042800d62434bb227715b39d109e926da8adc8216e036f3649a596b106f582402b93b92483cd945f4a4
-
SSDEEP
12288:uNgLeFR6rXlv312Z3vBr+nIUcos1N7PCwSw6Z:VXJ312ZvBgIUcF7PN
Malware Config
Extracted
formbook
4.1
jn17
hynasty.com
africacementreview.com
5280micropantry.com
qcyu2.us
jl777-web.com
hcwsports.com
update-number-au.com
ymymvip.top
postds.buzz
dogwifnobrim.com
usapubpong.com
shopscoopido.com
medical-equipment.company
onyagu.com
tldrparent.com
jvpeople.com
seangalbraithphotography.com
ptt-gov.art
mutcosmeticsec.com
metameme.online
mwintallation.com
luxury-collectables.com
4uprofreefavorite.lat
asopiti.com
egmrm.club
optimaenergy.cloud
zb1zq9.vip
landavacations.com
lilwef.site
smart-beds-15979.bond
vedicloud.com
floodedbasementcleanupnovimi.us
barakehlocal.com
music-europe.com
johnasian.com
jinhengbinguan.com
lkiu.xyz
cma-graphic.com
beatamin.club
ybqo.cc
salahtimeonline.com
lsdlj.com
hhhky.top
synfuturedefi.app
268120.com
mecpu.com
6bi0d.us
sjmsd.loan
green-vending-co.com
jgrlum.shop
gamedaemons.site
odysseyeurope.com
obet2359.com
manegociation.com
divainparfaumsnl.shop
colissimo-portail.com
mthfrgeneawareness.xyz
santeportailameli.info
davidonej.com
nyarapiyo.com
xn--lrxq61dxlf.top
in2glass.com
groda.art
mememeclothingshop.com
erocom.link
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2732-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2196-22-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2456 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
LF2024022.exeLF2024022.exeNETSTAT.EXEdescription pid process target process PID 1712 set thread context of 2732 1712 LF2024022.exe LF2024022.exe PID 2732 set thread context of 1256 2732 LF2024022.exe Explorer.EXE PID 2196 set thread context of 1256 2196 NETSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 2196 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
LF2024022.exepowershell.exeNETSTAT.EXEpid process 2732 LF2024022.exe 2732 LF2024022.exe 2956 powershell.exe 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE 2196 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
LF2024022.exeNETSTAT.EXEpid process 2732 LF2024022.exe 2732 LF2024022.exe 2732 LF2024022.exe 2196 NETSTAT.EXE 2196 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
LF2024022.exepowershell.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 2732 LF2024022.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 2196 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
LF2024022.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 1712 wrote to memory of 2956 1712 LF2024022.exe powershell.exe PID 1712 wrote to memory of 2956 1712 LF2024022.exe powershell.exe PID 1712 wrote to memory of 2956 1712 LF2024022.exe powershell.exe PID 1712 wrote to memory of 2956 1712 LF2024022.exe powershell.exe PID 1712 wrote to memory of 2636 1712 LF2024022.exe schtasks.exe PID 1712 wrote to memory of 2636 1712 LF2024022.exe schtasks.exe PID 1712 wrote to memory of 2636 1712 LF2024022.exe schtasks.exe PID 1712 wrote to memory of 2636 1712 LF2024022.exe schtasks.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1712 wrote to memory of 2732 1712 LF2024022.exe LF2024022.exe PID 1256 wrote to memory of 2196 1256 Explorer.EXE NETSTAT.EXE PID 1256 wrote to memory of 2196 1256 Explorer.EXE NETSTAT.EXE PID 1256 wrote to memory of 2196 1256 Explorer.EXE NETSTAT.EXE PID 1256 wrote to memory of 2196 1256 Explorer.EXE NETSTAT.EXE PID 2196 wrote to memory of 2456 2196 NETSTAT.EXE cmd.exe PID 2196 wrote to memory of 2456 2196 NETSTAT.EXE cmd.exe PID 2196 wrote to memory of 2456 2196 NETSTAT.EXE cmd.exe PID 2196 wrote to memory of 2456 2196 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\LF2024022.exe"C:\Users\Admin\AppData\Local\Temp\LF2024022.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\NZdJojwPG.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NZdJojwPG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4450.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\LF2024022.exe"C:\Users\Admin\AppData\Local\Temp\LF2024022.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\LF2024022.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4450.tmpFilesize
1KB
MD5acc6a320f52d19057021a0bfec6a8d75
SHA1efa332516bca53b1219278526d4ad1648cb22703
SHA256a9c7aa83b1781af026a0fc4769ec86de0848ad82e7094d067329759718253b33
SHA5120853f8a1121c203e7a6e3a5a74d0f3851f2f017eed62ca8c339b398198ed1045258714b18e35a67eb0b9d55af716859f1da7e971ec85431d6ff5014af1f4e402
-
memory/1712-3-0x00000000005F0000-0x0000000000610000-memory.dmpFilesize
128KB
-
memory/1712-2-0x0000000004C30000-0x0000000004C70000-memory.dmpFilesize
256KB
-
memory/1712-0-0x0000000000060000-0x0000000000102000-memory.dmpFilesize
648KB
-
memory/1712-4-0x0000000000620000-0x0000000000634000-memory.dmpFilesize
80KB
-
memory/1712-5-0x0000000001D60000-0x0000000001DD6000-memory.dmpFilesize
472KB
-
memory/1712-1-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/1712-20-0x00000000742A0000-0x000000007498E000-memory.dmpFilesize
6.9MB
-
memory/2196-21-0x0000000000990000-0x0000000000999000-memory.dmpFilesize
36KB
-
memory/2196-22-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/2732-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2732-18-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2732-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2732-15-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB