Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe
Resource
win7-20240705-en
General
-
Target
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe
-
Size
831KB
-
MD5
5ca90548bfafebd308ac134e049c334c
-
SHA1
bf538269ba7f53b4bb1ceac79c7a7f296b7e2715
-
SHA256
1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c
-
SHA512
eb9592d086a537290263770f5b7edc7f1dc679aaf22dd592763211794cc0433be770ce52b3116a3a9bee9d1846b8c33972a437d6ee73db9d6646c4a16c078f76
-
SSDEEP
24576:v/1zRDvw29GtsBaF0wqlK/qhgT/qLU1GYlafA:vtdw20tP0dlYZ/qLUWfA
Malware Config
Extracted
formbook
4.1
md02
onsen1508.com
partymaxclubmen36.click
texasshelvingwarehouse.com
tiantiying.com
taxcredits-pr.com
33mgbet.com
equipoleiremnacional.com
andrewghita.com
zbbnp.xyz
englandbreaking.com
a1b5v.xyz
vizamag.com
h0lg3.rest
ux-design-courses-17184.bond
of84.top
qqkartel88v1.com
avalynkate.com
cpuk-finance.com
yeslabs.xyz
webuyandsellpa.com
barnesassetrecovery.store
hecxion.xyz
theopencomputeproject.net
breezyvw.christmas
mumazyl.com
woby.xyz
jalaios10.vip
lynxpire.com
sparkbpo.com
333689z.com
rslotrank.win
adscendmfmarketing.com
detroitreels.com
xojiliv1.com
mzhhxxff.xyz
hitcomply.com
piedge-taiko.net
chiri.lat
bookmygaddi.com
hjemfinesse.shop
zruypj169g.top
solarfundis.com
pittsparking.com
teplo-invest.com
j3k7n.xyz
coloradoskinwellness.com
z8ggd.com
coinbureau.xyz
mamasprinkleofjoy.com
xotj7a.xyz
nijssenadventures.com
ysa-cn.com
tigajco69.fun
localhomeservicesadvisor.com
attorney-services-8344642.zone
rnwaifu.xyz
nyverian.com
family-lawyers-7009103.world
117myw.com
kingdom66.lat
tdshomesolution.com
momof2filiricans.com
saeutah.com
rakring.com
upcyclecharms.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3760-40-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1116-96-0x0000000000970000-0x000000000099F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3372 powershell.exe 3656 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4020 set thread context of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 3760 set thread context of 3456 3760 RegSvcs.exe 56 PID 1116 set thread context of 3456 1116 msiexec.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 3656 powershell.exe 3656 powershell.exe 3372 powershell.exe 3372 powershell.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 3760 RegSvcs.exe 3760 RegSvcs.exe 3656 powershell.exe 3372 powershell.exe 3760 RegSvcs.exe 3760 RegSvcs.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe 1116 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3760 RegSvcs.exe 3760 RegSvcs.exe 3760 RegSvcs.exe 1116 msiexec.exe 1116 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeDebugPrivilege 3760 RegSvcs.exe Token: SeDebugPrivilege 1116 msiexec.exe Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4020 wrote to memory of 3372 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 95 PID 4020 wrote to memory of 3372 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 95 PID 4020 wrote to memory of 3372 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 95 PID 4020 wrote to memory of 3656 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 97 PID 4020 wrote to memory of 3656 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 97 PID 4020 wrote to memory of 3656 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 97 PID 4020 wrote to memory of 3076 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 99 PID 4020 wrote to memory of 3076 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 99 PID 4020 wrote to memory of 3076 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 99 PID 4020 wrote to memory of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 4020 wrote to memory of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 4020 wrote to memory of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 4020 wrote to memory of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 4020 wrote to memory of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 4020 wrote to memory of 3760 4020 1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe 101 PID 3456 wrote to memory of 1116 3456 Explorer.EXE 102 PID 3456 wrote to memory of 1116 3456 Explorer.EXE 102 PID 3456 wrote to memory of 1116 3456 Explorer.EXE 102 PID 1116 wrote to memory of 4320 1116 msiexec.exe 104 PID 1116 wrote to memory of 4320 1116 msiexec.exe 104 PID 1116 wrote to memory of 4320 1116 msiexec.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe"C:\Users\Admin\AppData\Local\Temp\1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1541552b46b3b5a0d35698ce1d6bde3da40971bfda8d65897b2d6f343d815e3c.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\cqvYbdRxczOjiH.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cqvYbdRxczOjiH" /XML "C:\Users\Admin\AppData\Local\Temp\tmp21CB.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3076
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD54bddc7d6ad2f56e0747508a546f4521d
SHA19da0e6eb1729d52e17c6dce9e1f2038386f9315f
SHA25667bf1d8dbc6864e65d36c6e15690d08880c4081b72ee5aa71da5a24d975c3d53
SHA51216cc681d84c64f7e6f51048b850d279aff473ba660d8902394c59810a780288e0f3898675839fb28ab81dc946b0dd52935385fb31b780eff822d6b26a6a17098
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD51a629a10600ab1409e9366b8b47d638e
SHA1483565e47bc60a6d341055b9fa9ece8ae029e777
SHA2561d366970baba6931bd2385785503271b82712e63d9e0bedcca83799d6628ded4
SHA5121a1f4b07998c7f514e024744f7a666ce48aa94dbb4b3da0319066862fd137547628cc1cce08328e16bfb37420570ed70da768a4867535899ffc9f0fadc5c47be