Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe
Resource
win7-20240705-en
General
-
Target
4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe
-
Size
539KB
-
MD5
9bbdfbdfbfc6807ee9bae456d17987c6
-
SHA1
23bd49f1432429fe862075af73af430d355b881b
-
SHA256
4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6
-
SHA512
b6b69f44c9c110de07056babd9b897b0eb97e97d536fc2ce784a61db0f793c514354b5b521b2062582f4f5fd25f49da7adf9ce2b6d297a0ec2de23d094443498
-
SSDEEP
6144:YriM0yt1y1zw4Mt+KGqOY1Ks7nqOI38wWq/7PkI3mzXnqMMmiXmhDkZPAoYUl:3Mkzc0B1Y17nz083q/DkImn/pDkZodU
Malware Config
Extracted
formbook
4.1
g8ni
nickmowat.com
garethjame.biz
colibrilift.com
vulnerabilitylabs.one
neuro-ai-web-ru.website
16mcnaestreetmooneeponds.com
bestofstmaarten.net
meditelier.com
ragnarduke.com
escueladecampo.com
vongtayvn.com
inmemoriamaan.com
yourpeoplemanager.com
r6-gytr.com
agreeablebeauty.com
snpconfirms.com
tribalurq.quest
purafuse.com
cisco-training-course.com
wery.top
haiyaa.tech
schtefo.net
kenytc.com
energypopcorn.com
0urls.top
artiatec.com
enqum.com
nextcloud.solutions
stateaffairsng.com
727bpay.com
matchmakerfiji.com
qingdouge.com
nusrattelbdoffical.xyz
seo-clicks7.com
aspirateurs.net
autosandmorestore.com
moje-akvarium.net
uehddw.com
geschmacksakademie.com
gendarmerie.email
buynftinc.com
mission-nao.com
webmakers.xyz
federationwholesale.com
tjbieying.com
finestpoints.com
premiersloyko.xyz
carlislepartssurvey.com
hackernfts.com
abitvip.com
iphone13mini.supplies
thenorthfacedeal.online
swlhvipbj.com
elguije.com
auto2pl.com
route112mitsubishi.com
zilliq.com
pumateam04.com
xtzztf.com
sacmaudantoc.xyz
kalafwalker.com
jumeaux-numeriques.com
purposefulwork.com
jacquelineblog.info
er5544.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2628-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 2628 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2724 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 31 PID 2116 wrote to memory of 2724 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 31 PID 2116 wrote to memory of 2724 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 31 PID 2116 wrote to memory of 2724 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 31 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33 PID 2116 wrote to memory of 2628 2116 4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe"C:\Users\Admin\AppData\Local\Temp\4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zeVezGXu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6B41.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe"C:\Users\Admin\AppData\Local\Temp\4518e39cae8a580d388d0a729d38235d6324d4db1c596ad3db06d661131924b6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-