Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
qrpeTtY87wetpUB.exe
Resource
win7-20240220-en
General
-
Target
qrpeTtY87wetpUB.exe
-
Size
640KB
-
MD5
632da6b3d20acaebaaaf82ae60270ce0
-
SHA1
de0a1cae92d1f5ac0d6055c10e9a559f34c0e1dd
-
SHA256
9cfc2c5731c5a52202d43ad545f2256b8e00ce44110b6c8c63584de22fce913d
-
SHA512
1847c2fae54c9768c4a4c007f633ffc3dd8c4ad0d205356b6951e4770ca6328edce034f320cda7c3eac81db5094a0879b1e4139baa9b859dfce676c5b02abc00
-
SSDEEP
12288:0N4KkzdrJwKcIUPuv07OqH/+uGCuQi9gJfno2VrC4AVW6UMLboHd25hgvd:DcFuv8OqH/gQi98nogCFs6PnoHd4h
Malware Config
Extracted
formbook
4.1
cr12
nff1291.com
satyainfra.com
hechiceradeamores.com
jfgminimalist.com
qut68q.com
pedandmore.com
sugardefender24-usa.us
somalse.com
lotusluxecandle.com
certificadobassetpro.com
veryaroma.com
thehistoryofindia.in
33155.cc
terastudy.net
84031.vip
heilsambegegnen.com
horizon-rg.info
junongpei.website
winstons.club
henslotalt.us
home-care-72875.bond
elmetaversal.com
thetrendingproduct.com
kiki-hello-jury.com
fertami.info
free-cell-phones-en-arena.sbs
emilogiska.com
airexam.in
masters-of-1.com
othersidings.com
fullpaw.com
xmmtrader.com
astronomersparadise.net
cert.agency
pools-97641.bond
forexsignals-trading.com
bxsmediaconsulting.com
perfectedskincare.com
footresort.com
warehouse-inventory-80963.bond
purifygenius.com
bolinkpass.club
velleclub.com
epuar.com
winningpickleballshots.com
spiaggia.club
kadinzuri.com
keyboards-280323.cfd
africanfemalefounders.club
tkoelectriical.com
wg5688.com
properrr.com
fortune-tiger-rede.com
65302.vip
psychologyzerodegrees.today
top99bet4d.site
priuswuxi.com
carneden.com
ptwix.xyz
furniture-70925.bond
064817.com
ferradaoffroad.com
pix2click.life
jurj.xyz
spiritualpath.info
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4732-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4732-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4732-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/892-24-0x0000000001340000-0x000000000136F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
qrpeTtY87wetpUB.exeqrpeTtY87wetpUB.execscript.exedescription pid process target process PID 1612 set thread context of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 4732 set thread context of 3436 4732 qrpeTtY87wetpUB.exe Explorer.EXE PID 4732 set thread context of 3436 4732 qrpeTtY87wetpUB.exe Explorer.EXE PID 892 set thread context of 3436 892 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
qrpeTtY87wetpUB.execscript.exepid process 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe 892 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
qrpeTtY87wetpUB.execscript.exepid process 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 4732 qrpeTtY87wetpUB.exe 892 cscript.exe 892 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
qrpeTtY87wetpUB.execscript.exedescription pid process Token: SeDebugPrivilege 4732 qrpeTtY87wetpUB.exe Token: SeDebugPrivilege 892 cscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
qrpeTtY87wetpUB.exeExplorer.EXEcscript.exedescription pid process target process PID 1612 wrote to memory of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 1612 wrote to memory of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 1612 wrote to memory of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 1612 wrote to memory of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 1612 wrote to memory of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 1612 wrote to memory of 4732 1612 qrpeTtY87wetpUB.exe qrpeTtY87wetpUB.exe PID 3436 wrote to memory of 892 3436 Explorer.EXE cscript.exe PID 3436 wrote to memory of 892 3436 Explorer.EXE cscript.exe PID 3436 wrote to memory of 892 3436 Explorer.EXE cscript.exe PID 892 wrote to memory of 440 892 cscript.exe cmd.exe PID 892 wrote to memory of 440 892 cscript.exe cmd.exe PID 892 wrote to memory of 440 892 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\qrpeTtY87wetpUB.exe"C:\Users\Admin\AppData\Local\Temp\qrpeTtY87wetpUB.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\qrpeTtY87wetpUB.exe"C:\Users\Admin\AppData\Local\Temp\qrpeTtY87wetpUB.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\qrpeTtY87wetpUB.exe"3⤵PID:440
-
-