Overview
overview
10Static
static
101/0280cde4...60.exe
windows10-2004-x64
101/08b76206...65.exe
windows10-2004-x64
101/0e4fc438...91.exe
windows10-2004-x64
101/0fb86a8b...05.exe
windows10-2004-x64
101/25898c73...8f.exe
windows10-2004-x64
101/2c2e9491...3c.exe
windows10-2004-x64
101/2ef0f582...2e.exe
windows10-2004-x64
101/39884fc0...82.exe
windows10-2004-x64
101/3a72ecec...8a.exe
windows10-2004-x64
101/3bfcb4f7...71.exe
windows10-2004-x64
101/4103411f...f5.exe
windows10-2004-x64
101/4e0fdb84...95.exe
windows10-2004-x64
71/5297372f...33.exe
windows10-2004-x64
51/68292f38...e4.exe
windows10-2004-x64
101/6da4696b...e5.exe
windows10-2004-x64
71/7021c9cb...78.exe
windows10-2004-x64
101/752f5cc5...60.exe
windows10-2004-x64
101/7c7cded8...0c.exe
windows10-2004-x64
101/97d29ffc...84.exe
windows10-2004-x64
71/a306cc84...03.exe
windows10-2004-x64
71/ae1a168f...74.exe
windows10-2004-x64
71/b13f2364...d6.exe
windows10-2004-x64
81/b2a1d168...9d.bat
windows10-2004-x64
81/bb29aeb6...bd.exe
windows10-2004-x64
81/c8e5a24a...f5.bat
windows10-2004-x64
81/c9736cdc...97.exe
windows10-2004-x64
81/d58780d1...a0.exe
windows10-2004-x64
101/de19e016...d0.exe
windows10-2004-x64
11/e886016e...51.exe
windows10-2004-x64
101/f0f496ec...f4.bat
windows10-2004-x64
81/f28599b0...23.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 08:43
Behavioral task
behavioral1
Sample
1/0280cde4a65664a05361129dc1cfa10bc17b3fa9567103ce6eb9d07b06f8f160.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
1/08b7620610fc30c54e5cc095a54ae6d2949f68b0f224c285283e1612c254ef65.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
1/0e4fc438decc9723b89bd0e71b9ee30c1a8390e697d790b2d5ce96e94accd791.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
1/0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
1/25898c73a877d87ba289bb4ab9585eb36eba9d27d47af678a86befdbf9aa938f.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
1/2c2e949171d86da9b5c58901de2e4a99c4fe86fe92c47556f53b833ce77c503c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
1/2ef0f582367a7674aef245acb06977bf646419f1f8d05c7fb07881a6102f982e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
1/39884fc02ed9a51ffcc9b298916be79307f15f1518b6ae2021dd07af0aeecb82.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
1/3a72ecec34a29f53a1d73677a0e6f4c2e19087a32f1808f8f4ff643f62128d8a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
1/3bfcb4f798ba63a1d18887cb67c90e083d5561a58136a892bd9944528c707671.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
1/4103411f7bb66a033f9f5ce35839ba08b2a27d169e188a911185790f3b78bbf5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
1/4e0fdb84649ad15a0722789512aaef15c7bfbc4cab82b2a7b0ea52ac9594bb95.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
1/5297372fe85eea3ecc0d271b5567f2c7ee75bd3a04e745debddb04c9b05dae33.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
1/68292f388207f8ec69774dbad429e67420881ce46ecfad55f23182ec3a8893e4.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
1/6da4696b804777582ae586a4e9f42f6c18ccf540222d70dcf3374ee291e674e5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
1/7021c9cba6c224272f01d04450c6c31c93857a21feacfa4295a878a4d7b04378.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
1/752f5cc5a7b0f986286d09e8288c0958bc1b798477ca0d09dc2658c7ab109060.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
1/7c7cded8d1c0784881859ed03340d81c24ea9bf5d9972963cedf0e40b9856a0c.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
1/97d29ffc3556069c807b5c0ae2e2b109ae329feafc912d64f8b7f437bea47d84.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
1/a306cc84c907d6d57af300d1181128b24ca03e90c38ca7df7e84d35e80a63e03.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
1/ae1a168ff481173d18034d14a767c0801458e95cc3016dc8d82212d0c083a474.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
1/b13f23643fddce3f41b6908a00051b6688788668c81d698994c140bf6290c2d6.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
1/b2a1d168dc4234e687d0969b6a1901ac7e69c0d4bb72a1a4c76ba67fa6a14f9d.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
1/bb29aeb6ceecc37829b40e36f91a4620d7e0aae16b1ceea70bb70135e11172bd.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
1/c8e5a24a6d2fa68d7976457a19576b381e6211202500af5280b0f3b256446bf5.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
1/c9736cdc4ade9fddb9b293e0366f182f972154d98169b58e532b7905c310bf97.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
1/d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
1/de19e0163af15585c305f845b90262aee3c2bdf037f9fc733d3f1b379d00edd0.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
1/e886016e48bf0e3cd100d627678f345743509fd5f57f3c9b182f2833352bd451.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
1/f0f496eccc61594c53ded581b6683a77072f607ab018ec0a770a0aa7c7f45ff4.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
1/f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23.exe
Resource
win10v2004-20240709-en
General
-
Target
1/d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe
-
Size
691KB
-
MD5
c2ae4fdb661a151be4876289ed7f8261
-
SHA1
f8fbb8b8ddb55aacc20449ff2bd5d671e4cbb9fa
-
SHA256
d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0
-
SHA512
2642eac12e6a42fbd503621871802da278e0c68a4678675ddbe71f66d7a2b7d0ed8a22640c13d153ea63bcb33f7f13ae32eaa3e444fc451c64a1839d8cc91c89
-
SSDEEP
12288:luCDWx2PQfnESfZ0nl+xD4u1JW31MlxwXY5oMY3tQMmVHMe3+L4Ull0l8fkR:/awMnESR0nl+Z9OSXwXuoaVse3+sCie6
Malware Config
Extracted
formbook
4.1
45er
depotpulsa.com
k2bilbao.online
bb4uoficial.com
rwc666.club
us-pservice.cyou
tricegottreats.com
zsystems.pro
qudouyin6.com
sfumaturedamore.net
pcetyy.icu
notbokin.online
beqprod.tech
flipbuilding.com
errormitigationzoo.com
zj5u603.xyz
jezzatravel.com
zmdniavysyi.shop
quinnsteele.com
522334.com
outdoorshopping.net
7140k.vip
appmonster.live
rvrentalsusane.com
berry-hut.com
h-m-32.com
aklnk.xyz
project.fail
thelbacollection.com
ternkm.com
331022.xyz
qhr86.com
casvivip.com
f661dsa-dsf564a.biz
holisticfox.com
taobaoo03.com
kursy-parikmaher.store
reignscents.com
wot4x4.com
axoloterosa.com
instzn.site
nn477.xyz
jwsalestx.com
cualuoinuhoang.com
sagehrsuiteindercloud.solutions
2ecxab.vip
lottery99nft.xyz
budakbetingbet43.click
plaay.live
drmediapulsehub.com
bahismax.com
clareleeuwinclark.com
clarimix.com
ssongg11913.cfd
shapoorji-kingstown.com
detoxifysupplements.info
easy100ksidegig.com
abramovatata.online
barillonfo.net
keendeed.com
yunosave.online
pptv05.xyz
malianbeini.net
polariscicuit.com
sahibindencomparamguvend.link
used-cars-99583.bond
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral27/memory/2036-34-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral27/memory/2036-41-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral27/memory/2036-76-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral27/memory/2520-80-0x00000000009D0000-0x00000000009FF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4492 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3052 set thread context of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 2036 set thread context of 3460 2036 RegSvcs.exe 56 PID 2036 set thread context of 3460 2036 RegSvcs.exe 56 PID 2520 set thread context of 3460 2520 msiexec.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 4492 powershell.exe 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 4492 powershell.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe 2520 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2036 RegSvcs.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 2036 RegSvcs.exe 2520 msiexec.exe 2520 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe Token: SeDebugPrivilege 4492 powershell.exe Token: SeDebugPrivilege 2036 RegSvcs.exe Token: SeShutdownPrivilege 3460 Explorer.EXE Token: SeCreatePagefilePrivilege 3460 Explorer.EXE Token: SeDebugPrivilege 2520 msiexec.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4492 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 85 PID 3052 wrote to memory of 4492 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 85 PID 3052 wrote to memory of 4492 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 85 PID 3052 wrote to memory of 2540 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 87 PID 3052 wrote to memory of 2540 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 87 PID 3052 wrote to memory of 2540 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 87 PID 3052 wrote to memory of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 3052 wrote to memory of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 3052 wrote to memory of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 3052 wrote to memory of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 3052 wrote to memory of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 3052 wrote to memory of 2036 3052 d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe 89 PID 3460 wrote to memory of 2520 3460 Explorer.EXE 91 PID 3460 wrote to memory of 2520 3460 Explorer.EXE 91 PID 3460 wrote to memory of 2520 3460 Explorer.EXE 91 PID 2520 wrote to memory of 5064 2520 msiexec.exe 92 PID 2520 wrote to memory of 5064 2520 msiexec.exe 92 PID 2520 wrote to memory of 5064 2520 msiexec.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\1\d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe"C:\Users\Admin\AppData\Local\Temp\1\d58780d1d574bfe77c6f9cfad1cf4b51522231b2699081befd5bbd15f7309aa0.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXqUfHySpG.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXqUfHySpG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC92C.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:808
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:5064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD54f4e1301846331fabb3e6c7d72c391d9
SHA16cb5d1073f4d7b0fd09bf055268bd33d08abbc1e
SHA2569fbb32828b4df34773acb57f811e21bac3e2bb5e07bfdc2576d6d59dccdcce1d
SHA51252fd5cd617d1cda9ebc2279b08b405f85e0c14efb5bbe6e26cd0eee82805b01e33c64d2ff5dbd06f33753a89b8a8bc57e4cfe76daa5512632d03fdf688996ea9