Analysis
-
max time kernel
145s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe
Resource
win7-20240705-en
General
-
Target
HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe
-
Size
1.6MB
-
MD5
a03c2d4c4885db5f3e8264e2e0523ee9
-
SHA1
53d45a80e79d121ec6745cf8816acb7e6598b897
-
SHA256
9dbaa66ef9f31c83ab943932bc96eaf2d6e9c1995b427c75e6e9a259f2c91697
-
SHA512
6f2ec109bf1e5b96f35d2b8ff1cc8facad31f329adad3486198f5b80ba38e7a17bf6a10d355f770f4b05b16dc1fedacf43afeaecabdfc8d34b8e998e14135433
-
SSDEEP
24576:xlUjX00wR9Uqk8qW0gmRR1Gbp0PjcET+v3JR945EIy8o:xKjXMR9UN8lYGbp0P4E6v3Jf4
Malware Config
Extracted
formbook
4.1
rzn
lyeth.net
annatdinh.com
amber-pozzi.com
kalunenterprise.com
knightskysbts.com
drnishamaharaj.com
neverendingbreadsticks.com
asuvac.com
snapbidz.com
autovistoriapredial.net
eskisla.com
fiorej.com
probuscee.com
elysme.com
laizdancefit.com
pet-imports.com
imasshipping.com
greenflagcars.com
essentialoilphotos.com
demolition4us.com
rsgoldbull.com
nacpapercupmachine.com
pragati-enterprise.com
fremantlebeerfest.com
socialied.com
dagsberg.one
carbomais.com
loveandpeacebnb.com
kalnoor.com
kindflowers.net
emagreecendocomsaude.com
hangchinhhanguytin.com
daomaker.net
pleetly.com
netspenallacess.com
gardaen.com
cubrowsers.com
hidalgocountyattorneys.media
verliesconsulenten.vlaanderen
landlich.com
worldbankbank.com
szjmsht.com
mixproj.com
smilingquokka.com
hepfulawarness.com
hkhjbhqpha.com
naakwufleet.cloud
djteneightyp.com
joshkravitz.com
myevom.com
pasangslot.com
nandifile.com
annicepretty.com
thehorrorlandmiami.com
festivaldzm.com
ga-ix.net
photographerarena.com
seedoomedia.com
akujewelry.com
xn--clnicaimplantcenter-m1b.com
suwonbaekjak.com
gardenbrungot.com
bakldx.com
jnldesign.net
bentrys.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/3056-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3056-25-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3056-30-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 3060 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1820 set thread context of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 3056 set thread context of 1256 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 20 PID 3056 set thread context of 1256 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 20 PID 2716 set thread context of 1256 2716 rundll32.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2388 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe 2716 rundll32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 2716 rundll32.exe 2716 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3056 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe Token: SeDebugPrivilege 2716 rundll32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2388 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 30 PID 1820 wrote to memory of 2388 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 30 PID 1820 wrote to memory of 2388 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 30 PID 1820 wrote to memory of 2388 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 30 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1820 wrote to memory of 3056 1820 HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe 32 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2716 1256 Explorer.EXE 33 PID 2716 wrote to memory of 3060 2716 rundll32.exe 34 PID 2716 wrote to memory of 3060 2716 rundll32.exe 34 PID 2716 wrote to memory of 3060 2716 rundll32.exe 34 PID 2716 wrote to memory of 3060 2716 rundll32.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe"C:\Users\Admin\AppData\Local\Temp\HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TbBsVt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA737.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe"C:\Users\Admin\AppData\Local\Temp\HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\HEC Batangas Integrated LNG and Power Project DocumentationsType a message.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
- System Location Discovery: System Language Discovery
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528e929d0691771df7fa14ac944ad1612
SHA1a982786121f01f407b9d9f1f928a8acb7788792d
SHA2567a0c1e044cad156b92b35e548c8df059a7138ba4fa3ce640cb4c588c72237fa0
SHA51233fc5d0643543438f07eb3deebd8d4abbf9e53d67840b65eb0a8680574ffe63ef74fddf4203649c467b86b0c375978cd2f408f80a6efa338ab545f9b1b90939d