Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
Narudžbenica 08BIH2024.exe
Resource
win7-20240729-en
General
-
Target
Narudžbenica 08BIH2024.exe
-
Size
656KB
-
MD5
dae6a17dd50c76b58fb2c7d980e801d9
-
SHA1
8b1fce08ff057639bd4eb7ebd6231417569b6494
-
SHA256
60bc892c0d2392091394c2ba22701447e399860c4b8d9a0dee014db3da78b1a6
-
SHA512
9453a2389c54b524adfeee11bf90284168b2fff30c7c962fe48cdc3e7e1c893dfc45a64107067900440834be95f0cf02e83c7c7a8c2e673a2d73ef311f6bda04
-
SSDEEP
12288:2M23a/zmcDXmxqPbKwII+foXlIHdHfQJkE1ij7qObjjTCYT59Whpehsh9kR:2V3aakXenBmSokE1ivcGshhg
Malware Config
Extracted
formbook
4.1
md02
onsen1508.com
partymaxclubmen36.click
texasshelvingwarehouse.com
tiantiying.com
taxcredits-pr.com
33mgbet.com
equipoleiremnacional.com
andrewghita.com
zbbnp.xyz
englandbreaking.com
a1b5v.xyz
vizamag.com
h0lg3.rest
ux-design-courses-17184.bond
of84.top
qqkartel88v1.com
avalynkate.com
cpuk-finance.com
yeslabs.xyz
webuyandsellpa.com
barnesassetrecovery.store
hecxion.xyz
theopencomputeproject.net
breezyvw.christmas
mumazyl.com
woby.xyz
jalaios10.vip
lynxpire.com
sparkbpo.com
333689z.com
rslotrank.win
adscendmfmarketing.com
detroitreels.com
xojiliv1.com
mzhhxxff.xyz
hitcomply.com
piedge-taiko.net
chiri.lat
bookmygaddi.com
hjemfinesse.shop
zruypj169g.top
solarfundis.com
pittsparking.com
teplo-invest.com
j3k7n.xyz
coloradoskinwellness.com
z8ggd.com
coinbureau.xyz
mamasprinkleofjoy.com
xotj7a.xyz
nijssenadventures.com
ysa-cn.com
tigajco69.fun
localhomeservicesadvisor.com
attorney-services-8344642.zone
rnwaifu.xyz
nyverian.com
family-lawyers-7009103.world
117myw.com
kingdom66.lat
tdshomesolution.com
momof2filiricans.com
saeutah.com
rakring.com
upcyclecharms.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2232-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2300-28-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2704 powershell.exe 2400 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2356 set thread context of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2232 set thread context of 1248 2232 RegSvcs.exe 21 PID 2300 set thread context of 1248 2300 systray.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Narudžbenica 08BIH2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2356 Narudžbenica 08BIH2024.exe 2356 Narudžbenica 08BIH2024.exe 2356 Narudžbenica 08BIH2024.exe 2400 powershell.exe 2704 powershell.exe 2232 RegSvcs.exe 2232 RegSvcs.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe 2300 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2232 RegSvcs.exe 2232 RegSvcs.exe 2232 RegSvcs.exe 2300 systray.exe 2300 systray.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2356 Narudžbenica 08BIH2024.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 2704 powershell.exe Token: SeDebugPrivilege 2232 RegSvcs.exe Token: SeDebugPrivilege 2300 systray.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2400 2356 Narudžbenica 08BIH2024.exe 31 PID 2356 wrote to memory of 2400 2356 Narudžbenica 08BIH2024.exe 31 PID 2356 wrote to memory of 2400 2356 Narudžbenica 08BIH2024.exe 31 PID 2356 wrote to memory of 2400 2356 Narudžbenica 08BIH2024.exe 31 PID 2356 wrote to memory of 2704 2356 Narudžbenica 08BIH2024.exe 33 PID 2356 wrote to memory of 2704 2356 Narudžbenica 08BIH2024.exe 33 PID 2356 wrote to memory of 2704 2356 Narudžbenica 08BIH2024.exe 33 PID 2356 wrote to memory of 2704 2356 Narudžbenica 08BIH2024.exe 33 PID 2356 wrote to memory of 2720 2356 Narudžbenica 08BIH2024.exe 35 PID 2356 wrote to memory of 2720 2356 Narudžbenica 08BIH2024.exe 35 PID 2356 wrote to memory of 2720 2356 Narudžbenica 08BIH2024.exe 35 PID 2356 wrote to memory of 2720 2356 Narudžbenica 08BIH2024.exe 35 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 2356 wrote to memory of 2232 2356 Narudžbenica 08BIH2024.exe 37 PID 1248 wrote to memory of 2300 1248 Explorer.EXE 38 PID 1248 wrote to memory of 2300 1248 Explorer.EXE 38 PID 1248 wrote to memory of 2300 1248 Explorer.EXE 38 PID 1248 wrote to memory of 2300 1248 Explorer.EXE 38 PID 2300 wrote to memory of 2340 2300 systray.exe 39 PID 2300 wrote to memory of 2340 2300 systray.exe 39 PID 2300 wrote to memory of 2340 2300 systray.exe 39 PID 2300 wrote to memory of 2340 2300 systray.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Narudžbenica 08BIH2024.exe"C:\Users\Admin\AppData\Local\Temp\Narudžbenica 08BIH2024.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Narudžbenica 08BIH2024.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BGELwANFeozDW.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BGELwANFeozDW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC02.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59cf482a9cba085c0e1df2fad8b5344fb
SHA16c6522f23cbe0bd903d98c658f2e51bd640e3eca
SHA25665a6dad73c1e04a14304f27773e0f611342e149ce504a68a618a70d966b99a8c
SHA5127a740602a07c7fabcab00898929e905fe045bebbca6fdbaace7ba32fc726ce4a44bd243b136b6c5f33a674acd4b27c2ea6631fbd18476b7a847e738f1c9cd356
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0ZHN2W23UT569AE38QD5.temp
Filesize7KB
MD5f76cad623931c4f730253e3d51034464
SHA1798841bda1f7766f2cdd160c3cedc69de1becdb6
SHA25604d0cdc468029505bfe8df7ec012ab5aa7673e75c01f55ecb2f33ec64d2fe470
SHA512abd519d952b1a09e866c26e4c0941cb746f4a75582fe06c1dc7e361f1d480cd0757a100860064b56c21f865184204971ee6f2ec5f16b6bbb1215b3e9e91e63c9