Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_10070724.exe
Resource
win7-20240704-en
General
-
Target
RFQ_10070724.exe
-
Size
397KB
-
MD5
d1e512460f6ecd4f7907b81870f9ed9a
-
SHA1
2e91712215b031056a7425a07fd53457a5ab4803
-
SHA256
541823134f27a10dd69e8824dc93101dd943730a8ea5f65d9b2ef1c6a643dcee
-
SHA512
7f0c838cc93b243fc45d1ef1e779022118f6504b8f65542200acadaa18f8864a753fd5f507ca2b4c82ab266ba2b32e2fa3dbcb064201e05b4b20022c8542d55e
-
SSDEEP
6144:n1FxxGv75a3j51E+S6bjNeksVG9tAA1tIX3NYeI8GYb5D:niD5aTEb6nzdGA1tIYeQYb5
Malware Config
Extracted
formbook
4.1
na10
tetheus.com
ventlikeyoumeanit.com
tintbliss.com
rinabet357.com
sapphireboutiqueusa.com
abc8bet6.com
xzcn3i7jb13cqei.buzz
pinktravelsnagpur.com
bt365038.com
rtpbossujang303.shop
osthirmaker.com
thelonelyteacup.com
rlc2019.com
couverture-charpente.com
productivagc.com
defendercarcare.com
abcentixdigital.com
petco.ltd
oypivh.top
micro.guru
hokivegasslots.club
5663876.com
symboleffekt.info
tworiverlabsintake.com
pegaso.store
sasoera.com
material.chat
taniamckirdy.com
dansistosproductions.com
moromorojp.com
z27e1thx976ez3u.buzz
skinrenue.com
nbvci.xyz
jakobniinja.xyz
snykee.com
sl24.top
wawturkiye.xyz
virtualeventsbyelaine.com
giorgiaclerico.com
d9psk8.xyz
hard-to-miss.space
awclog.com
topcomparativos.com
somoyboutique.com
findlove.pro
zbo170.app
dexcoenergy.com
nona23.lat
ingelset.com
hexatelier.com
nftees.tech
visionarymaterialsinstitute.com
khanyos.com
bz59.top
migraine-treatment-28778.bond
catboxbot.online
kkugames.com
llmsearchoptimization.com
fipbhvvb.xyz
vmytzptc.xyz
intermediafx.shop
lhrrs.com
grimreapervalley.com
discount-fess.space
liamcollinai.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/220-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/220-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4920-26-0x0000000000380000-0x00000000003AF000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 56 4920 wscript.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2044 set thread context of 220 2044 RFQ_10070724.exe 86 PID 220 set thread context of 3332 220 RFQ_10070724.exe 56 PID 4920 set thread context of 3332 4920 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_10070724.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 RFQ_10070724.exe 2044 RFQ_10070724.exe 220 RFQ_10070724.exe 220 RFQ_10070724.exe 220 RFQ_10070724.exe 220 RFQ_10070724.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe 4920 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 220 RFQ_10070724.exe 220 RFQ_10070724.exe 220 RFQ_10070724.exe 4920 wscript.exe 4920 wscript.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2044 RFQ_10070724.exe Token: SeDebugPrivilege 220 RFQ_10070724.exe Token: SeDebugPrivilege 4920 wscript.exe Token: SeShutdownPrivilege 3332 Explorer.EXE Token: SeCreatePagefilePrivilege 3332 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3332 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 220 2044 RFQ_10070724.exe 86 PID 2044 wrote to memory of 220 2044 RFQ_10070724.exe 86 PID 2044 wrote to memory of 220 2044 RFQ_10070724.exe 86 PID 2044 wrote to memory of 220 2044 RFQ_10070724.exe 86 PID 2044 wrote to memory of 220 2044 RFQ_10070724.exe 86 PID 2044 wrote to memory of 220 2044 RFQ_10070724.exe 86 PID 3332 wrote to memory of 4920 3332 Explorer.EXE 90 PID 3332 wrote to memory of 4920 3332 Explorer.EXE 90 PID 3332 wrote to memory of 4920 3332 Explorer.EXE 90 PID 4920 wrote to memory of 3640 4920 wscript.exe 91 PID 4920 wrote to memory of 3640 4920 wscript.exe 91 PID 4920 wrote to memory of 3640 4920 wscript.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\RFQ_10070724.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_10070724.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\RFQ_10070724.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_10070724.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_10070724.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-