Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
New Sample.exe
Resource
win7-20240903-en
General
-
Target
New Sample.exe
-
Size
750KB
-
MD5
b3c5debaee5fc3162ebe21ff4348ba10
-
SHA1
11f4c3c6dbb5cbe09d150acfad464f00ef2fc5f8
-
SHA256
0494f0bd0225edd027f43a581e4504d0b73fadac437c809dce717c0d159cf1e8
-
SHA512
cd104a78378581b9e9d9fad9618fe212febf62097cb134cef8b4dbf980065c389e67218ac7c2f78a88aa6eea249a4d0db7651bb9b9db09c29afc248c2c6c94e9
-
SSDEEP
12288:6umEhatVMuUcAzRpYooXxSBj3mnkvoBAllR7YMpv3dFcUH:UEKTIpYt03HvomfR7YqtS
Malware Config
Extracted
formbook
4.1
ga06
y1rmgv9c.top
orlifebasma.online
ocxxcakkejka.online
ealthcaretrendstr.bond
quitemtudo.online
oeziad.net
afelajuzq.shop
andasia.net
4web.info
acingdreams.xyz
fcpc.sbs
pin238rtp.lol
olar-systems-panels-91358.bond
ovember222.vip
01639.xyz
xfundz.top
illsol.top
rerise.shop
eavenlavvi.net
rtificial-turf23.online
uhgo.xyz
azarethacademyhs.net
66mj900gm.bond
98sj192nt.autos
ipinya.online
ussian-dating-75755.bond
ikohub.net
ixedmediastudios.net
rsolarislighthouse.vip
ubeauty.xyz
refabricated-homes-68115.bond
ental-health-57519.bond
oliticsnewsour.xyz
5563.club
nterlightled.online
avings-accounts-93129.bond
ewamahjong88link.top
yuhadookin.xyz
hehealthyhealer.xyz
4m21a4k.christmas
fgy7kdlr.world
oursocialnew.buzz
efnightsky.xyz
spo.online
aidatowers.net
espirarfrance.online
epezombie.xyz
lush-diamonds.xyz
jkbpa.top
lsyn.net
48424316.top
uddhistfuneral737988.online
roxypayment.net
earing-aids-95037.bond
animakana.net
uatroxproject.xyz
ek-otomotiv.xyz
imeandspace.design
inup-casino-ciq7.xyz
rherres.shop
ence4u.net
ergola-66203.bond
8080732.xyz
ransportationmpsmtpro.top
iviendas-embargadas.xyz
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/1456-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1456-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1456-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/404-73-0x0000000000540000-0x000000000056F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3512 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation New Sample.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3608 set thread context of 1456 3608 New Sample.exe 91 PID 1456 set thread context of 3436 1456 New Sample.exe 56 PID 1456 set thread context of 3436 1456 New Sample.exe 56 PID 404 set thread context of 3436 404 raserver.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 3608 New Sample.exe 3608 New Sample.exe 1456 New Sample.exe 1456 New Sample.exe 1456 New Sample.exe 1456 New Sample.exe 3512 powershell.exe 3512 powershell.exe 1456 New Sample.exe 1456 New Sample.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe 404 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1456 New Sample.exe 1456 New Sample.exe 1456 New Sample.exe 1456 New Sample.exe 404 raserver.exe 404 raserver.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3608 New Sample.exe Token: SeDebugPrivilege 1456 New Sample.exe Token: SeDebugPrivilege 3512 powershell.exe Token: SeShutdownPrivilege 3436 Explorer.EXE Token: SeCreatePagefilePrivilege 3436 Explorer.EXE Token: SeDebugPrivilege 404 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3436 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3512 3608 New Sample.exe 88 PID 3608 wrote to memory of 3512 3608 New Sample.exe 88 PID 3608 wrote to memory of 3512 3608 New Sample.exe 88 PID 3608 wrote to memory of 3668 3608 New Sample.exe 90 PID 3608 wrote to memory of 3668 3608 New Sample.exe 90 PID 3608 wrote to memory of 3668 3608 New Sample.exe 90 PID 3608 wrote to memory of 1456 3608 New Sample.exe 91 PID 3608 wrote to memory of 1456 3608 New Sample.exe 91 PID 3608 wrote to memory of 1456 3608 New Sample.exe 91 PID 3608 wrote to memory of 1456 3608 New Sample.exe 91 PID 3608 wrote to memory of 1456 3608 New Sample.exe 91 PID 3608 wrote to memory of 1456 3608 New Sample.exe 91 PID 3436 wrote to memory of 404 3436 Explorer.EXE 92 PID 3436 wrote to memory of 404 3436 Explorer.EXE 92 PID 3436 wrote to memory of 404 3436 Explorer.EXE 92 PID 404 wrote to memory of 1676 404 raserver.exe 93 PID 404 wrote to memory of 1676 404 raserver.exe 93 PID 404 wrote to memory of 1676 404 raserver.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\New Sample.exe"C:\Users\Admin\AppData\Local\Temp\New Sample.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New Sample.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\New Sample.exe"C:\Users\Admin\AppData\Local\Temp\New Sample.exe"3⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\New Sample.exe"C:\Users\Admin\AppData\Local\Temp\New Sample.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New Sample.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82