Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 17:00
Static task
static1
Behavioral task
behavioral1
Sample
rrk590123c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rrk590123c.exe
Resource
win10v2004-20241007-en
General
-
Target
rrk590123c.exe
-
Size
297KB
-
MD5
668a6855d8ce2efa9f23170bd7c5ac5e
-
SHA1
0586ab192841fa947644184d667e81640ea25957
-
SHA256
7dcb1ee79eae7ff95e311aa25d0f73f1d89c266a8f609dfd31782054b03c3de6
-
SHA512
7070bb748df0445b88c2438dd738967d61f10523a148e6df84088dd0baba36c5a4861685056f024b2f55b8f3bf1a7021a8a5adc43ed7d0580937d1de8c5a87de
-
SSDEEP
6144:hsg/lR8Nb2PKfOlQQ7b5q9lDY5m0cW6qpzt1lOMzxGusc7d5iv2:hsg/lmbjzjtMiO5iv2
Malware Config
Extracted
formbook
4.1
k1rc
manchesterflowerwalls.com
hyperhostns.info
leverj.exchange
bringcovidhome.com
natalieball.com
glaseye.com
buyersmeetsellers.net
dronerealestate.net
calfwag.com
hoodhippy.com
prophunting.com
yange03.com
ffpgv.top
valengz.com
handbagsbreeze.com
excellencepi.com
iopsms.xyz
farmacykauai.com
dmarc.press
aridham.com
laive.chat
yenisarkisi.com
step1clean.com
templabels.com
zimmerkauf.com
pussyfarts69.com
crewe-tech.com
registergamers.com
yourgafflettings.com
novitadelgiorno.com
mayberrycommunities.com
boldae.com
utikejt.com
purple.gifts
findmyiphone.services
eagle-rock-real-estate.com
abundando.com
paysamba.com
4860p.com
airlinesfm.com
radiosta.com
scrippshealthprivacynotice.com
toughershop.com
xn--sllskapsdjur-gcb.com
wyattwillgetbetter.com
borwoo-packaging.com
testcomp8260.com
infomediosdigital.com
top10musicmarketing.com
gwokath.com
filledbasket.com
azaza.store
townsendcomics.net
sarahhariri.com
xn--kipinpaja-z2a.com
richmondpistolpermit.com
wildeliving.net
emmonsfororegon.com
leorisingcreative.com
teach.wine
alpha-psych.com
sans35studios.com
loty-hd.com
seekingyours.com
fbrblog.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2952-3-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2952-5-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1924 set thread context of 2952 1924 rrk590123c.exe 32 PID 2952 set thread context of 1196 2952 rrk590123c.exe 21 PID 2040 set thread context of 1196 2040 cmd.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrk590123c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2952 rrk590123c.exe 2952 rrk590123c.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe 2040 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1924 rrk590123c.exe 2952 rrk590123c.exe 2952 rrk590123c.exe 2952 rrk590123c.exe 2040 cmd.exe 2040 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2952 rrk590123c.exe Token: SeDebugPrivilege 2040 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1196 Explorer.EXE 1196 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2952 1924 rrk590123c.exe 32 PID 1924 wrote to memory of 2952 1924 rrk590123c.exe 32 PID 1924 wrote to memory of 2952 1924 rrk590123c.exe 32 PID 1924 wrote to memory of 2952 1924 rrk590123c.exe 32 PID 1924 wrote to memory of 2952 1924 rrk590123c.exe 32 PID 1196 wrote to memory of 2040 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2040 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2040 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2040 1196 Explorer.EXE 33 PID 2040 wrote to memory of 2760 2040 cmd.exe 34 PID 2040 wrote to memory of 2760 2040 cmd.exe 34 PID 2040 wrote to memory of 2760 2040 cmd.exe 34 PID 2040 wrote to memory of 2760 2040 cmd.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rrk590123c.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2760
-
-