Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
image_00yu.exe
Resource
win7-20240705-en
General
-
Target
image_00yu.exe
-
Size
684KB
-
MD5
5b671e65052b9fe3672bf5671193a415
-
SHA1
42e2cbed170357699d64541d458ee4bab1c9e04d
-
SHA256
8b4af4f4e4ff7945788cfd890de28517157ebbd54b28561b02eaa4774a8c6573
-
SHA512
008225e7dcb3a9241c465a7f356c003758004392b3fc5aa777151ccd34c4fd602bad6f839416af9bb0960a2d08588c6b80ac375499b07c1f05229a256a758f14
-
SSDEEP
12288:v2xu/Zx7GpuKjGAes2CEo1xBPuE8/ygGt6pQeI9usAtZGobkkN++KQ/YRjIkR:eQ/7I3xeuEQLcyrQ99tAxkN45Nf
Malware Config
Extracted
formbook
4.1
rn10
kedai168et.com
mental-olympics.com
pussybuildsstrongbones.net
857691.shop
hisellers.net
exposurecophotography.com
beaded-boutique.net
wednesdayholdings.com
plesacv.xyz
manonlineros.com
a0204.shop
333689g.com
dyprl716h.xyz
pulseirabet.com
fnet.work
bo-2024-001-v1-d1.xyz
ongaurdsecurity.com
giulianacristini.com
miladamani.com
magicalrealmshopkeeper.online
dy62i.com
pfjxhzz.com
yieks.voto
wallseason.com
kclsec.xyz
findwineinspace.com
everydayoptics.com
pg15.top
schody.net
82647351.com
fluteindia.com
infominer.club
kedai168el.com
compuglobalhypermeganet.app
designs-by-syn.com
godmachines.net
play-fortuna-ahf.buzz
lyjxk.com
waysfundraising.online
topuptalkmore.com
jingalraid.cfd
stonebahis411.com
adonicfuran.xyz
5z1lcnbm.fun
ignitorite.com
375bey.xyz
oloutlets.com
jn66-com-opqrst99988.com
xins.live
buchstabieralphabet.info
sfazzino.com
facai86.xyz
rapidsignsystems.com
golightresins.com
fpsportsmedia.com
superpawbulous.com
qsigoqav.xyz
anshtiwari314.online
flood-risk.net
voegbedrijf-offerte.com
onliinnforrmmosa.com
duangendget.store
georgiausssa.xyz
boldmusicmgt.com
teamhore724.buzz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2720-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2720-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2720-28-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2608-31-0x00000000000B0000-0x00000000000DF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2760 powershell.exe -
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 468 set thread context of 2720 468 image_00yu.exe 33 PID 2720 set thread context of 1256 2720 image_00yu.exe 21 PID 2720 set thread context of 1256 2720 image_00yu.exe 21 PID 2608 set thread context of 1256 2608 wscript.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language image_00yu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 468 image_00yu.exe 468 image_00yu.exe 468 image_00yu.exe 468 image_00yu.exe 468 image_00yu.exe 468 image_00yu.exe 468 image_00yu.exe 2720 image_00yu.exe 2720 image_00yu.exe 2760 powershell.exe 2720 image_00yu.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe 2608 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2720 image_00yu.exe 2720 image_00yu.exe 2720 image_00yu.exe 2720 image_00yu.exe 2608 wscript.exe 2608 wscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 468 image_00yu.exe Token: SeDebugPrivilege 2720 image_00yu.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 2608 wscript.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 468 wrote to memory of 2760 468 image_00yu.exe 31 PID 468 wrote to memory of 2760 468 image_00yu.exe 31 PID 468 wrote to memory of 2760 468 image_00yu.exe 31 PID 468 wrote to memory of 2760 468 image_00yu.exe 31 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 468 wrote to memory of 2720 468 image_00yu.exe 33 PID 1256 wrote to memory of 2608 1256 Explorer.EXE 34 PID 1256 wrote to memory of 2608 1256 Explorer.EXE 34 PID 1256 wrote to memory of 2608 1256 Explorer.EXE 34 PID 1256 wrote to memory of 2608 1256 Explorer.EXE 34 PID 2608 wrote to memory of 2688 2608 wscript.exe 35 PID 2608 wrote to memory of 2688 2608 wscript.exe 35 PID 2608 wrote to memory of 2688 2608 wscript.exe 35 PID 2608 wrote to memory of 2688 2608 wscript.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\image_00yu.exe"C:\Users\Admin\AppData\Local\Temp\image_00yu.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\image_00yu.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\image_00yu.exe"C:\Users\Admin\AppData\Local\Temp\image_00yu.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\image_00yu.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2688
-
-