Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 096300.exe
Resource
win7-20240704-en
General
-
Target
RFQ 096300.exe
-
Size
368KB
-
MD5
802c413ef3a40b505e5b8e2e0fc7bada
-
SHA1
02f663db266a9151430cc3433b1497b170971769
-
SHA256
7f4d53805b50624cb5e92857423661c3aef89e24c4ca63e79fdf62cbe2cb694c
-
SHA512
d9e76abb4840e9d9f253c9ec710fafd69fad38c66097e9143269279ba48a668165402a46854f2052e520535299a6f410b34f0e23a4ca0ec9e398c4ff5a85a453
-
SSDEEP
6144:F1PWgZQTC1b470TdNou2vOgfB5MRfCjN2EImHXkN:fWgD1OIQugfzMkjN2CY
Malware Config
Extracted
formbook
4.1
q5e
2177.ltd
thanxiety.com
max-width.com
fixti.net
mostmaj.com
mobilteknolojiuzmani.com
historyannals.com
wheelchairmotion.com
mossandmoonstonestudio.com
kastellifournis.com
axokey.net
peekl.com
metsteeshirt.com
abcfinancial-inc.com
btxrsp.com
amydh.com
ccoauthority.com
lumacorretora.com
kimfelixrealtor.com
iconext.biz
giftstgg.com
imonsanto.com
invoicefor.com
qfhxlw.com
wsykyy.com
gladius.network
peliculaslatino.online
timookflour.com
gxkuangjian.com
utvklj.men
rabota-v-avon.online
sheashealingway.com
thoitrangaoda.com
rytechweb.com
circuit69.com
crowd-design.biz
carosiandrhee.com
778d88.com
calvinkl.com
cjkit.com
jgkwhgxe.com
sanitascuadromedico.com
mellorangello.com
whiteinnocence.com
medtechdesignstudio.net
nurturingskin.com
guardyourweb.net
juw2017.com
jnheroes.com
damicosoftwaresystems.com
gesband.com
onwardsandupwards.info
gopropackaging.com
centerforaunts.com
sarrahshewdesign.com
intelligentcoach.net
iasisf.agency
products-news.com
calvinspring.com
100zan.site
9mahina.com
saleaustralianboots.com
floatinginfotech.com
calcinoneweek.com
yofdyk.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3884-16-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/3884-21-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2904 set thread context of 3884 2904 RFQ 096300.exe 100 PID 3884 set thread context of 3256 3884 RFQ 096300.exe 55 PID 3244 set thread context of 3256 3244 svchost.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ 096300.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 3884 RFQ 096300.exe 3884 RFQ 096300.exe 3884 RFQ 096300.exe 3884 RFQ 096300.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe 3244 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3884 RFQ 096300.exe 3884 RFQ 096300.exe 3884 RFQ 096300.exe 3244 svchost.exe 3244 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3884 RFQ 096300.exe Token: SeDebugPrivilege 3244 svchost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3256 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3884 2904 RFQ 096300.exe 100 PID 2904 wrote to memory of 3884 2904 RFQ 096300.exe 100 PID 2904 wrote to memory of 3884 2904 RFQ 096300.exe 100 PID 2904 wrote to memory of 3884 2904 RFQ 096300.exe 100 PID 2904 wrote to memory of 3884 2904 RFQ 096300.exe 100 PID 2904 wrote to memory of 3884 2904 RFQ 096300.exe 100 PID 3256 wrote to memory of 3244 3256 Explorer.EXE 102 PID 3256 wrote to memory of 3244 3256 Explorer.EXE 102 PID 3256 wrote to memory of 3244 3256 Explorer.EXE 102 PID 3244 wrote to memory of 2116 3244 svchost.exe 103 PID 3244 wrote to memory of 2116 3244 svchost.exe 103 PID 3244 wrote to memory of 2116 3244 svchost.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:4932
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ 096300.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:3208