Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 096300.exe
Resource
win7-20240704-en
General
-
Target
RFQ 096300.exe
-
Size
368KB
-
MD5
802c413ef3a40b505e5b8e2e0fc7bada
-
SHA1
02f663db266a9151430cc3433b1497b170971769
-
SHA256
7f4d53805b50624cb5e92857423661c3aef89e24c4ca63e79fdf62cbe2cb694c
-
SHA512
d9e76abb4840e9d9f253c9ec710fafd69fad38c66097e9143269279ba48a668165402a46854f2052e520535299a6f410b34f0e23a4ca0ec9e398c4ff5a85a453
-
SSDEEP
6144:F1PWgZQTC1b470TdNou2vOgfB5MRfCjN2EImHXkN:fWgD1OIQugfzMkjN2CY
Malware Config
Extracted
formbook
4.1
q5e
2177.ltd
thanxiety.com
max-width.com
fixti.net
mostmaj.com
mobilteknolojiuzmani.com
historyannals.com
wheelchairmotion.com
mossandmoonstonestudio.com
kastellifournis.com
axokey.net
peekl.com
metsteeshirt.com
abcfinancial-inc.com
btxrsp.com
amydh.com
ccoauthority.com
lumacorretora.com
kimfelixrealtor.com
iconext.biz
giftstgg.com
imonsanto.com
invoicefor.com
qfhxlw.com
wsykyy.com
gladius.network
peliculaslatino.online
timookflour.com
gxkuangjian.com
utvklj.men
rabota-v-avon.online
sheashealingway.com
thoitrangaoda.com
rytechweb.com
circuit69.com
crowd-design.biz
carosiandrhee.com
778d88.com
calvinkl.com
cjkit.com
jgkwhgxe.com
sanitascuadromedico.com
mellorangello.com
whiteinnocence.com
medtechdesignstudio.net
nurturingskin.com
guardyourweb.net
juw2017.com
jnheroes.com
damicosoftwaresystems.com
gesband.com
onwardsandupwards.info
gopropackaging.com
centerforaunts.com
sarrahshewdesign.com
intelligentcoach.net
iasisf.agency
products-news.com
calvinspring.com
100zan.site
9mahina.com
saleaustralianboots.com
floatinginfotech.com
calcinoneweek.com
yofdyk.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2772-12-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2772-16-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2388 set thread context of 2772 2388 RFQ 096300.exe 32 PID 2772 set thread context of 1276 2772 RFQ 096300.exe 21 PID 3052 set thread context of 1276 3052 mstsc.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 096300.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2388 RFQ 096300.exe 2388 RFQ 096300.exe 2772 RFQ 096300.exe 2772 RFQ 096300.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe 3052 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2772 RFQ 096300.exe 2772 RFQ 096300.exe 2772 RFQ 096300.exe 3052 mstsc.exe 3052 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2388 RFQ 096300.exe Token: SeDebugPrivilege 2772 RFQ 096300.exe Token: SeDebugPrivilege 3052 mstsc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2468 2388 RFQ 096300.exe 31 PID 2388 wrote to memory of 2468 2388 RFQ 096300.exe 31 PID 2388 wrote to memory of 2468 2388 RFQ 096300.exe 31 PID 2388 wrote to memory of 2468 2388 RFQ 096300.exe 31 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 2388 wrote to memory of 2772 2388 RFQ 096300.exe 32 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 33 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 33 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 33 PID 1276 wrote to memory of 3052 1276 Explorer.EXE 33 PID 3052 wrote to memory of 1996 3052 mstsc.exe 34 PID 3052 wrote to memory of 1996 3052 mstsc.exe 34 PID 3052 wrote to memory of 1996 3052 mstsc.exe 34 PID 3052 wrote to memory of 1996 3052 mstsc.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"{path}"3⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1996
-
-