Resubmissions
26/07/2024, 12:14
240726-persfs1alb 10Analysis
-
max time kernel
300s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
TNS71092E68UI0.vbe
Resource
win7-20240708-en
General
-
Target
TNS71092E68UI0.vbe
-
Size
785KB
-
MD5
83ef588dc92a85ef93d055290393a07d
-
SHA1
c7fa54bb9f8d5467137197b8e344b95d2e1f4430
-
SHA256
02500b9058612028c5667bfd9302d81184689fcb88eb5500902d39baec246fa0
-
SHA512
eb1adad95a1269dd49e202e966b67a8d3867055c1462687596fa47dd133929544a295e2e3b04f8bfe3c87690d241f780f4a1ad75718e462b468007e3e8dd0827
-
SSDEEP
12288:WEPXAjdRFEYFexVioNs4tkt4pNVZUAZTklPuAGPm1LEKIV8rrq9bbeQnhG4Shmo9:nPXApEY0ioCUpNV+unrKs869FE5hmo9
Malware Config
Extracted
formbook
4.1
de94
way2future.net
worldnewsdailys.online
rendamaisbr.com
s485.icu
vcxwpo.xyz
imagivilleartists.com
herbatyorganics.com
xn--80ado1abokv5d.xn--p1acf
invigoratewell.com
especialistaleitura.online
pkrstg.com
performacaretechnical.com
dreamgame55.net
hkitgugx.xyz
istanlikbilgiler.click
slotter99j.vip
exploringtheoutdoors.net
triberoots.com
energiaslotsbet.com
dkforcm.com
rtp1kijangwin.top
monkeytranslate.com
21stcut.shop
hgty866.xyz
shaktitest.site
monrocasino-508.com
level4d1.bet
nbcze.com
rtproketslotcsn.art
xjps.ltd
yoanamod.com
gv031.net
mceliteroofing.com
1wtrh.com
online-dating-24966.bond
dentalbrasstacks.com
kf7wzmuzv0w.xyz
gyosei-arimura.com
shopyzones.shop
bradleyboy.xyz
bradleyboy.xyz
nownzen.store
buysellrepresent.com
tateshades.xyz
club1stclass.com
2309238042.com
ashleymorgan.live
xn--pdr89n.vip
princecl.xyz
mindfulmanifest.net
c4ads.net
exlith.com
jiogskeojg.xyz
lxrtl.com
cshark-sguser.com
h021b.rest
alfiethorhalls.com
librosinfantiles.top
alazamexports.com
mehalhouse.com
slvtapeworld.com
mybest.engineer
legalix.xyz
kuuichi.xyz
happygreenfarm.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2680-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2680-25-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2600-32-0x00000000000F0000-0x000000000011F000-memory.dmp formbook -
Executes dropped EXE 4 IoCs
pid Process 3028 HHhHh.exe 2852 HHhHh.exe 2728 HHhHh.exe 2680 HHhHh.exe -
Loads dropped DLL 3 IoCs
pid Process 3028 HHhHh.exe 3028 HHhHh.exe 3028 HHhHh.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3028 set thread context of 2680 3028 HHhHh.exe 34 PID 2680 set thread context of 1216 2680 HHhHh.exe 21 PID 2600 set thread context of 1216 2600 wuapp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HHhHh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuapp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 3028 HHhHh.exe 3028 HHhHh.exe 3028 HHhHh.exe 3028 HHhHh.exe 2680 HHhHh.exe 2680 HHhHh.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe 2600 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2680 HHhHh.exe 2680 HHhHh.exe 2680 HHhHh.exe 2600 wuapp.exe 2600 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3028 HHhHh.exe Token: SeDebugPrivilege 2680 HHhHh.exe Token: SeDebugPrivilege 2600 wuapp.exe Token: SeShutdownPrivilege 1216 Explorer.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3028 1484 WScript.exe 30 PID 1484 wrote to memory of 3028 1484 WScript.exe 30 PID 1484 wrote to memory of 3028 1484 WScript.exe 30 PID 1484 wrote to memory of 3028 1484 WScript.exe 30 PID 3028 wrote to memory of 2852 3028 HHhHh.exe 32 PID 3028 wrote to memory of 2852 3028 HHhHh.exe 32 PID 3028 wrote to memory of 2852 3028 HHhHh.exe 32 PID 3028 wrote to memory of 2852 3028 HHhHh.exe 32 PID 3028 wrote to memory of 2728 3028 HHhHh.exe 33 PID 3028 wrote to memory of 2728 3028 HHhHh.exe 33 PID 3028 wrote to memory of 2728 3028 HHhHh.exe 33 PID 3028 wrote to memory of 2728 3028 HHhHh.exe 33 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 3028 wrote to memory of 2680 3028 HHhHh.exe 34 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 1216 wrote to memory of 2600 1216 Explorer.EXE 35 PID 2600 wrote to memory of 2812 2600 wuapp.exe 36 PID 2600 wrote to memory of 2812 2600 wuapp.exe 36 PID 2600 wrote to memory of 2812 2600 wuapp.exe 36 PID 2600 wrote to memory of 2812 2600 wuapp.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\TNS71092E68UI0.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\HHhHh.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
561KB
MD562fa567cbb7227aeb7755b679d780725
SHA10280d019165f8df6b76cfa87047c76d9003ab193
SHA2567b67dc6ad75a054a5baaff1cb3e61c2436823de4fd80b6e73cd9cbbb850f6d81
SHA512ceb8059393dbf6b2e55fe324fc957a319223508162cb278fa3a48a849b2c77d2aab285b91c3a122c56c72d2819ce24a18b02bc2bf83963634f083929e74b1b01