Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
UjCrfOAkJJiZyZh.exe
Resource
win7-20240705-en
General
-
Target
UjCrfOAkJJiZyZh.exe
-
Size
720KB
-
MD5
8bc1a99eb7877ceb4fc51338ef7fe9f2
-
SHA1
e16dc5f7b5af7340c8ccf95f0bb66f4dc7516053
-
SHA256
f3fe763c0bab8b6423578bbe031190508406459cf1648b47dcba314c95ca8fbc
-
SHA512
8e1768e9fb8279dad8deba557e3d06c65646508c87cd18c9b3d031969ee9ebec2024cc9af3cfcbb5d497d835049364726542c9ca3e7259d5d2b30491dc61bcbc
-
SSDEEP
12288:tU3929BC4rqhp2ejzGSs89JtD0EEdf6aqjCScbuyUIzEYPmRDCVZkR:tU89BNuhT489J90EEdf6aSci+9E
Malware Config
Extracted
formbook
4.1
ps15
57797.asia
jhpwt.net
basketballdrillsforkids.com
zgzf6.rest
casinomaxnodepositbonus.icu
uptocryptonews.com
gomenasorry.com
fortanix.space
stripscity.xyz
genbotdiy.xyz
mayson-wedding.com
neb-hub.net
seancollinsmusic.com
migraine-treatment-57211.bond
prosperawoman.info
tradefairleads.tech
xn--yeminlitercme-6ob.com
xwaveevent.com
fashiontrendshub.xyz
window-replacement-80823.bond
simplesculpt.online
ellipsive.com
urbandollsllc.com
kgwcmx.xyz
marabudigital.online
abcblindcompany.com
seraphmovement.com
overrideapp.com
holistichealthviews.com
lovemyhome.online
mullermachinery.com
packsperfeitas.shop
gmgex1.com
jlk168.com
xyz-hd.xyz
happysmall.online
phwin777.vip
market-pam.com
kling-ai.xyz
kaidifeiniroo.net
822963429.xyz
bet4win99.com
ryuk-studio.com
tricianihaonewyork.net
plasoi.xyz
mi006.com
briefout.cloud
urbangrowcity.fun
yrund.asia
morningritualtemplate.com
eehuvvqj.xyz
flymgl.com
ux75.top
bluemarblen5d.com
trezorsuite.net
thepeacedealers.com
harlemshake-burgers.com
thesvacha.com
usdj.xyz
stdaev.com
your-coffee-to-talk.com
passrmale.com
resmierabaru20.shop
window-replacement-22581.bond
33pgaaa.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2852-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2660-28-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1472 powershell.exe 2716 powershell.exe -
Deletes itself 1 IoCs
pid Process 1172 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2404 set thread context of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2852 set thread context of 1228 2852 UjCrfOAkJJiZyZh.exe 21 PID 2660 set thread context of 1228 2660 colorcpl.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UjCrfOAkJJiZyZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2404 UjCrfOAkJJiZyZh.exe 2404 UjCrfOAkJJiZyZh.exe 2852 UjCrfOAkJJiZyZh.exe 2852 UjCrfOAkJJiZyZh.exe 2716 powershell.exe 1472 powershell.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe 2660 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2852 UjCrfOAkJJiZyZh.exe 2852 UjCrfOAkJJiZyZh.exe 2852 UjCrfOAkJJiZyZh.exe 2660 colorcpl.exe 2660 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2404 UjCrfOAkJJiZyZh.exe Token: SeDebugPrivilege 2852 UjCrfOAkJJiZyZh.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 2660 colorcpl.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1472 2404 UjCrfOAkJJiZyZh.exe 31 PID 2404 wrote to memory of 1472 2404 UjCrfOAkJJiZyZh.exe 31 PID 2404 wrote to memory of 1472 2404 UjCrfOAkJJiZyZh.exe 31 PID 2404 wrote to memory of 1472 2404 UjCrfOAkJJiZyZh.exe 31 PID 2404 wrote to memory of 2716 2404 UjCrfOAkJJiZyZh.exe 33 PID 2404 wrote to memory of 2716 2404 UjCrfOAkJJiZyZh.exe 33 PID 2404 wrote to memory of 2716 2404 UjCrfOAkJJiZyZh.exe 33 PID 2404 wrote to memory of 2716 2404 UjCrfOAkJJiZyZh.exe 33 PID 2404 wrote to memory of 2712 2404 UjCrfOAkJJiZyZh.exe 34 PID 2404 wrote to memory of 2712 2404 UjCrfOAkJJiZyZh.exe 34 PID 2404 wrote to memory of 2712 2404 UjCrfOAkJJiZyZh.exe 34 PID 2404 wrote to memory of 2712 2404 UjCrfOAkJJiZyZh.exe 34 PID 2404 wrote to memory of 2972 2404 UjCrfOAkJJiZyZh.exe 37 PID 2404 wrote to memory of 2972 2404 UjCrfOAkJJiZyZh.exe 37 PID 2404 wrote to memory of 2972 2404 UjCrfOAkJJiZyZh.exe 37 PID 2404 wrote to memory of 2972 2404 UjCrfOAkJJiZyZh.exe 37 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 2404 wrote to memory of 2852 2404 UjCrfOAkJJiZyZh.exe 38 PID 1228 wrote to memory of 2660 1228 Explorer.EXE 43 PID 1228 wrote to memory of 2660 1228 Explorer.EXE 43 PID 1228 wrote to memory of 2660 1228 Explorer.EXE 43 PID 1228 wrote to memory of 2660 1228 Explorer.EXE 43 PID 2660 wrote to memory of 1172 2660 colorcpl.exe 44 PID 2660 wrote to memory of 1172 2660 colorcpl.exe 44 PID 2660 wrote to memory of 1172 2660 colorcpl.exe 44 PID 2660 wrote to memory of 1172 2660 colorcpl.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nyQRtjgLz.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nyQRtjgLz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp426.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"3⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1984
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2612
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2620
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2628
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\UjCrfOAkJJiZyZh.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD572d26eda83cef57d6c0f9e6afbead7cd
SHA1cbf4efa1a9b96a038e42dc9b354c8f942ef1d134
SHA256e84707c537841c645336a7553bdb55060c5b9d8680e1c2641b6467aa6c5146e3
SHA512e61def18592ff97fb6955bb28fac05cbe0565730ce791bdf1d3eff3409b12ad92852a93c4b6b5318335967d7225c49d006e538b68d01111bdf9c6b49618a78a2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5754003d441c17fc3bd36379b6b90325c
SHA1efdedb07f422fada6f933d0cd0f7011b606fc7d2
SHA256482c9bef929983e49c029d7ee4a542067629e218f9db83376b66c799b675208d
SHA5123f765ed73150eb5283dbb628533aeaf914f2c72e15e5fd687194c5c740abe1f51fa97a2d9f7cca409f150388173edac7497b37802bd0bffa2d346b264154943b