Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
MTM2019-2 ph12 RESG.exe
Resource
win7-20240221-en
General
-
Target
MTM2019-2 ph12 RESG.exe
-
Size
1.6MB
-
MD5
ca6397f8234b085dbffcd71872910163
-
SHA1
aed7c39031d764e25c5758a3c276144cee36a131
-
SHA256
cd4b7cfc524a98551a90fccc7110e52fcce550152cf1ad1017fba87c68faab1d
-
SHA512
6221ddef49a594636f172335e01328d99d75aa2974c9935d10d244504e810682c61b63ea7db94425b89a1302947e597a50ec8444a607d72434e631532f90820a
-
SSDEEP
24576:+AHnh+eWsN3skA4RV1Hom2KXMmHa2uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyCSbY:ph+ZkldoPK8Yajl0
Malware Config
Extracted
formbook
3.9
bi
paulmeehanart.com
east-parker.com
brenttitcomb.com
joannaoon.com
pufrzgl.com
jconscomml.com
alyssafergusonart.com
yuperspective.com
sheseed.com
soicausieuchuan102.com
facexl.com
greenmountainpwc.com
perthbusinessclass.com
gerpling24.com
frbzf.com
netsycosmetics.co.uk
qiulen.com
connecticutstudent.loan
mclellansautomotive.net
kaifanghuashi.com
changshajinfu.com
rapidcommand.win
danielmontemusic.online
buystilnox.com
acfreemag16.com
suzyrosadesigns.com
meihengsheng.com
silverlligence.com
6kfn00nu6.biz
kentlawaetz.com
kysumientay.com
samoconnorphotography.com
nhenhenhem.com
angelabellaflores.com
jdfinp2p.com
0d1zerouser.loan
titanachockey.com
ivanllamas07.net
serviciotecnicobogota.biz
cacristoviene.com
c7768.com
hannibalchew.tech
bootsiemwc.com
yinzhenzhong.com
jpdlbu.ink
genteysazon.com
blainewellnessday.com
rekindlingthewaters.net
xn--bqry8cez7cy8z.com
thaimassage-leonberg.gmbh
blackgirlpretty.com
jamsessionpodcast.com
anwenorg.com
adventureasset.com
helpmeronda.tech
trendgou.com
happytreeartistry.com
rupertfernandes.com
ebisu-bar-k.com
tzgabo.com
focusandship.com
wellaweboard.com
hepublic.com
www215860.com
ajexin.com
Signatures
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1752-2-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/1752-9-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
MTM2019-2 ph12 RESG.exeRegAsm.exeNAPSTAT.EXEdescription pid process target process PID 2012 set thread context of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 1752 set thread context of 1208 1752 RegAsm.exe Explorer.EXE PID 2612 set thread context of 1208 2612 NAPSTAT.EXE Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
RegAsm.exeNAPSTAT.EXEpid process 1752 RegAsm.exe 1752 RegAsm.exe 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegAsm.exeNAPSTAT.EXEpid process 1752 RegAsm.exe 1752 RegAsm.exe 1752 RegAsm.exe 2612 NAPSTAT.EXE 2612 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RegAsm.exeNAPSTAT.EXEdescription pid process Token: SeDebugPrivilege 1752 RegAsm.exe Token: SeDebugPrivilege 2612 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
MTM2019-2 ph12 RESG.exeExplorer.EXENAPSTAT.EXEdescription pid process target process PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 2012 wrote to memory of 1752 2012 MTM2019-2 ph12 RESG.exe RegAsm.exe PID 1208 wrote to memory of 2612 1208 Explorer.EXE NAPSTAT.EXE PID 1208 wrote to memory of 2612 1208 Explorer.EXE NAPSTAT.EXE PID 1208 wrote to memory of 2612 1208 Explorer.EXE NAPSTAT.EXE PID 1208 wrote to memory of 2612 1208 Explorer.EXE NAPSTAT.EXE PID 2612 wrote to memory of 2532 2612 NAPSTAT.EXE cmd.exe PID 2612 wrote to memory of 2532 2612 NAPSTAT.EXE cmd.exe PID 2612 wrote to memory of 2532 2612 NAPSTAT.EXE cmd.exe PID 2612 wrote to memory of 2532 2612 NAPSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MTM2019-2 ph12 RESG.exe"C:\Users\Admin\AppData\Local\Temp\MTM2019-2 ph12 RESG.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1208-7-0x0000000003180000-0x0000000003280000-memory.dmpFilesize
1024KB
-
memory/1208-10-0x00000000050C0000-0x00000000051AA000-memory.dmpFilesize
936KB
-
memory/1208-15-0x00000000050C0000-0x00000000051AA000-memory.dmpFilesize
936KB
-
memory/1752-2-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1752-4-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1752-1-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1752-8-0x0000000000360000-0x0000000000374000-memory.dmpFilesize
80KB
-
memory/1752-9-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1752-6-0x0000000002610000-0x0000000002913000-memory.dmpFilesize
3.0MB
-
memory/2012-0-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/2612-11-0x0000000000330000-0x0000000000376000-memory.dmpFilesize
280KB
-
memory/2612-12-0x0000000000330000-0x0000000000376000-memory.dmpFilesize
280KB