Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe
Resource
win7-20240729-en
General
-
Target
7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe
-
Size
1.1MB
-
MD5
b0896ccaf97625a546e53df07bb98769
-
SHA1
39d66b58804ff0f1b600b910713118041f0ddd4b
-
SHA256
7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861
-
SHA512
2aa7ead5dd4ef225acecd4d56d1735b7041e1e772e5c82f177561638d262daeff4aca86c14a1b1bcaef5d4cf538d65b3bd0d5842a3382559d7727a379f74e50f
-
SSDEEP
24576:1qDEvCTbMWu7rQYlBQcBiT6rprG8acGCRB5I89:1TvC/MTQYxsWR7acjp
Malware Config
Extracted
formbook
4.1
cn14
fgfdwr254u.xyz
arm-uk.com
qoachu.com
radiantpm.christmas
ghacor.delivery
lindasartgmbh.com
agroguasch.com
silverlinedevelopment.net
1000thb.com
bremwq.xyz
qweuiop.top
dental-implants-21860.bond
elotesaguafria.com
biagiottifraticelli.com
pureleafworks.com
mokomusic.com
lunarqr.shop
bestbuyprods.com
michaelsec.com
morganstore.net
adventureswithbeans.com
kavitaforcm.com
irananalog.com
newvisio.com
casino-x-zerkalo8tn6.xyz
attrji115s.top
6eidh1.xyz
gharamedibleoil.com
rtptwitspin.autos
wdzhsy.asia
nocyon.com
pawsomepastriesofgeorgia.com
drnutritionnn.xyz
1fkgfgn98.shop
wangpumen-2hhh222.xyz
ya37w.top
cinematography-jobs-74591.bond
mcboysclub.xyz
3e032.com
trauma911.net
tcsjarky.com
geekstreaming.com
stsfilo.com
pixellab.top
seocuba.com
sos-easyappclient.net
westbournedentalsurgery.com
bookishbusiness.com
ljstf.com
poshyyh.christmas
jasminemariahopkins.com
bdsign.ink
tamracollection.com
alpha-kicks.com
kamramhay.com
bowoslot.lol
epigraphbio.com
tbcxmq834x.top
57-24.sbs
qewpc.asia
insuranceinfoo.xyz
core-forex.net
phenixex.com
14033.shop
thesharkysteps.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2608-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2608-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2608-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3588-24-0x0000000000B80000-0x0000000000BAF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3068 set thread context of 2608 3068 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe 86 PID 2608 set thread context of 3504 2608 svchost.exe 56 PID 2608 set thread context of 3504 2608 svchost.exe 56 PID 3588 set thread context of 3504 3588 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe 3588 chkdsk.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3068 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 3588 chkdsk.exe 3588 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2608 svchost.exe Token: SeDebugPrivilege 3588 chkdsk.exe Token: SeShutdownPrivilege 3504 Explorer.EXE Token: SeCreatePagefilePrivilege 3504 Explorer.EXE Token: SeShutdownPrivilege 3504 Explorer.EXE Token: SeCreatePagefilePrivilege 3504 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3504 Explorer.EXE 3504 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3504 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2608 3068 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe 86 PID 3068 wrote to memory of 2608 3068 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe 86 PID 3068 wrote to memory of 2608 3068 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe 86 PID 3068 wrote to memory of 2608 3068 7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe 86 PID 2608 wrote to memory of 3588 2608 svchost.exe 87 PID 2608 wrote to memory of 3588 2608 svchost.exe 87 PID 2608 wrote to memory of 3588 2608 svchost.exe 87 PID 3588 wrote to memory of 5068 3588 chkdsk.exe 88 PID 3588 wrote to memory of 5068 3588 chkdsk.exe 88 PID 3588 wrote to memory of 5068 3588 chkdsk.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe"C:\Users\Admin\AppData\Local\Temp\7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\7e27edc8405ad4fdfcf6d5de75046b0dace6386f05dac3382629b0692274f861.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
-
-