Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
PO#A91641-MSKU9953077.exe
Resource
win7-20240708-en
General
-
Target
PO#A91641-MSKU9953077.exe
-
Size
428KB
-
MD5
5ccd1492d563b11ffdfd66d51aa370b5
-
SHA1
3a7441cb83f5ca0732e8826f164c087b077a69a5
-
SHA256
e777d588f24e21fdcc3add6de5b93d5fb498b594a59f03d02b5a7880bc5d5180
-
SHA512
11625c6391526fd798ed1d22b8df9a5278241b4b2ec0e37d1d8493ef5a7f1fad4f4d850c67713a431d38739a43d5b7e88394dc039de49ae986e7b215be2f5444
-
SSDEEP
6144:cbhdbMroO/lGquzY2ZmmjrmQGnHpnP6aupTzqfU0IgDKTTVz6TRvdqs0QC+VkTfW:IbMrQHzY2ZDgR6aKiIgDQVyYAkTfg
Malware Config
Extracted
formbook
4.1
ergs
oceanprimesanfrancisco.com
dk-tnc.com
sodangwang.com
abrat-ed.com
dusubiqiqijem.xyz
getsup.online
homeneto.com
shose8.com
tronlane.com
nidowicosasod.xyz
independienteatleticclub.com
pca-winschool.com
realbadnastystories.site
bluevioletfloral.com
simplifiedpeacepodcast.com
abcfreediving.com
theyardbunny.com
holoique.com
ibkr1325.com
tjnfioou.xyz
bumbleapi.com
universityofnorthdakota.com
kisoriyan.com
scienceiva.com
permislbzd.store
mysoiree-lyon.com
philippinenow.com
officialjoyslots.com
casualdatingsites.online
delia-flores.com
eroerofuck.com
myesu.net
tryhard-production.com
3beadsbytj.com
congtycoessentials.net
3doutfits.com
spencersigmon.xyz
mewydyrqd.xyz
manigua.store
teescuchooffee.com
websitetudong.com
shiere.com
rummypepper.com
universeinteriors.com
royaledutyfree.com
evolutionarycurandera.com
seulookexpress.com
seajetguard.com
monikamosur.com
columbiaathleticboosters.com
sem4seo.com
businesstechblueprint.com
kreativemarketingconcepts.com
maisons-france-confort-mp.com
lixinjishaiwang.com
mybrabdmall.com
mrdreamhouse.com
graysrbm.online
theboathub.com
50039219.com
rincondelvinologo.com
coreatechnologyonline.com
artuta.com
teaneckvegan.com
iselotech.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4448-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4448-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4448-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1160-28-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3244 set thread context of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 4448 set thread context of 3516 4448 PO#A91641-MSKU9953077.exe 56 PID 4448 set thread context of 3516 4448 PO#A91641-MSKU9953077.exe 56 PID 1160 set thread context of 3516 1160 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#A91641-MSKU9953077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1160 NETSTAT.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3244 PO#A91641-MSKU9953077.exe 3244 PO#A91641-MSKU9953077.exe 3244 PO#A91641-MSKU9953077.exe 3244 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE 1160 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 4448 PO#A91641-MSKU9953077.exe 1160 NETSTAT.EXE 1160 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3244 PO#A91641-MSKU9953077.exe Token: SeDebugPrivilege 4448 PO#A91641-MSKU9953077.exe Token: SeDebugPrivilege 1160 NETSTAT.EXE Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE Token: SeShutdownPrivilege 3516 Explorer.EXE Token: SeCreatePagefilePrivilege 3516 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3244 PO#A91641-MSKU9953077.exe 3244 PO#A91641-MSKU9953077.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3516 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3244 wrote to memory of 4416 3244 PO#A91641-MSKU9953077.exe 98 PID 3244 wrote to memory of 4416 3244 PO#A91641-MSKU9953077.exe 98 PID 3244 wrote to memory of 4416 3244 PO#A91641-MSKU9953077.exe 98 PID 3244 wrote to memory of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 3244 wrote to memory of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 3244 wrote to memory of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 3244 wrote to memory of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 3244 wrote to memory of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 3244 wrote to memory of 4448 3244 PO#A91641-MSKU9953077.exe 99 PID 3516 wrote to memory of 1160 3516 Explorer.EXE 101 PID 3516 wrote to memory of 1160 3516 Explorer.EXE 101 PID 3516 wrote to memory of 1160 3516 Explorer.EXE 101 PID 1160 wrote to memory of 1656 1160 NETSTAT.EXE 102 PID 1160 wrote to memory of 1656 1160 NETSTAT.EXE 102 PID 1160 wrote to memory of 1656 1160 NETSTAT.EXE 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2932
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#A91641-MSKU9953077.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1656
-
-