Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:48
Static task
static1
Behavioral task
behavioral1
Sample
MEmpEng.exe
Resource
win7-20240708-en
General
-
Target
MEmpEng.exe
-
Size
604KB
-
MD5
dd2e0becfb1316c49975386fc3367c45
-
SHA1
98c578ff997ef781919ca5967251fa9d462a756e
-
SHA256
14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628
-
SHA512
4768fa7aa32dc02e958c8506880311bb0d4fa5a9cd9fcdc6581a8349b1d85b3323513d28018b55ffbdb79e440e4b371dfb260cbd097ffd2279993b9a1a416bfb
-
SSDEEP
12288:MVVeXpcIofxcshf8R5wjY/nCdfpfwzW2kTFzcdppLLO:eePofZhf8BnCbft2kajy
Malware Config
Extracted
formbook
4.1
b48n
anifestmindset.net
ommybahamabigsales.shop
3tcxr.xyz
iano-world.net
rconf23.net
atherpa.shop
trllrpartners.club
5sawit777.pro
ctbhuxcdreioijresol.top
opinatlas.app
pinstar.xyz
mfengwa.top
8games13.xyz
tickpaket.online
iphuodongallbbtbtm.top
ental-bridges-51593.bond
laywithkemon.rest
lkpiou.xyz
a88.land
igfloppafan.club
12k5t7i2j.sbs
lubfitgrowth.xyz
uro-news.live
espets1.buzz
uccessfuldatingtips.info
sed-cars-93620.bond
epatitis-treatment-25621.bond
ocakges.click
yai54.top
estbuy-purchase.online
itesmiledl.net
power.services
olar-systems-panels-31076.bond
5571.club
ffg7.autos
reespins.claims
arriage-therapy-60427.bond
3am.sbs
tk-m.online
atami-suzuki.net
op-smartphone-deals.today
acik.rest
srsvrfive.xyz
6561.xyz
ajubasah1.buzz
t83t56zshegbbo.sbs
dma.xyz
xrduxsd220.xyz
leaningcompanies-near-me.today
aregiverjobs-2507-ns.click
reensick.online
rmunx.shop
ewllife.net
tp3-pick4d.shop
ianju-ljef097.vip
oxshop1.online
wuogi.top
46rr211sm.autos
saac-xaaab.buzz
zaohh.online
ontosdabiblia.online
ackson-xaaab.buzz
v5t7.xyz
udo-flix.pro
5ldym2.shop
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2888-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2888-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2800-23-0x0000000000130000-0x000000000015F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1812 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2500 set thread context of 2888 2500 MEmpEng.exe 32 PID 2888 set thread context of 1196 2888 MEmpEng.exe 21 PID 2800 set thread context of 1196 2800 NETSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEmpEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2800 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2500 MEmpEng.exe 2500 MEmpEng.exe 2888 MEmpEng.exe 2888 MEmpEng.exe 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE 2800 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2888 MEmpEng.exe 2888 MEmpEng.exe 2888 MEmpEng.exe 2800 NETSTAT.EXE 2800 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2500 MEmpEng.exe Token: SeDebugPrivilege 2888 MEmpEng.exe Token: SeDebugPrivilege 2800 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2084 2500 MEmpEng.exe 31 PID 2500 wrote to memory of 2084 2500 MEmpEng.exe 31 PID 2500 wrote to memory of 2084 2500 MEmpEng.exe 31 PID 2500 wrote to memory of 2084 2500 MEmpEng.exe 31 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 2500 wrote to memory of 2888 2500 MEmpEng.exe 32 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2800 1196 Explorer.EXE 33 PID 2800 wrote to memory of 1812 2800 NETSTAT.EXE 34 PID 2800 wrote to memory of 1812 2800 NETSTAT.EXE 34 PID 2800 wrote to memory of 1812 2800 NETSTAT.EXE 34 PID 2800 wrote to memory of 1812 2800 NETSTAT.EXE 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"3⤵PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MEmpEng.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1812
-
-