Analysis
-
max time kernel
300s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 14:16
Static task
static1
Behavioral task
behavioral1
Sample
ENQ-2024e-HRZ.exe
Resource
win7-20240729-en
General
-
Target
ENQ-2024e-HRZ.exe
-
Size
677KB
-
MD5
75aacca487fb7128f42de15494552fac
-
SHA1
96772c827aa2761f3c24d8d43b772e540bf018d2
-
SHA256
5d021ca8e798f9713c4778b806fa00c207dbe34f4efec22ec5d1b65dd59c68a7
-
SHA512
a3422ce50e83f9f3a229604a1748db6e8c332de2c2cfa3ce68ab7790f82310397ee574783e35620dc46813572b99c661a718e053b66d2fb1aa5587027b295a1f
-
SSDEEP
12288:eL3exHZno/a5VhER7UZ5ahB028cuoxjjCrST6KRNtuSnRLCEEguWqpn:eL3exH9o4Xs4Z5ahB58cuoxjWmJRGSnO
Malware Config
Extracted
formbook
4.1
c24t
ealthbridgeccs.online
ngelicais.art
uktuksu1.sbs
fapoker.asia
hecreature.tech
orenzoplaybest14.xyz
op-smartphones-deal.today
delark.click
7395.asia
otnews.cfd
j16e.xyz
oko.events
fscxb.top
roudtxliberals.vote
asas-br.bond
ourhealthyourlife.shop
fbpd.top
j9u9.xyz
uijiuw.top
aming-chair-37588.bond
uaweiharmony.top
458881233.men
ewancash.boats
mss-rb2.net
472.top
yhomeshop.online
j88.travel
02s-pest-control-us-ze.fun
oinl.club
ouseware.today
1385.net
eviewmadu.top
khizmetlergirisyapzzz2024.net
dcnn.net
aketrtpmvpslot88.info
hoys.club
ealerslot.net
consuyt.xyz
ilw.legal
aithful.events
est-life-insurance-2507.today
rvinsadeli.dev
sx9u.shop
23fd595ig.autos
yrhbt.shop
commerce-74302.bond
lc-driving-school.net
7y1ps.shop
earing-tests-69481.bond
amilablackwell.online
venir-bienne.info
024tengxun396.buzz
ocoani.shop
arage-door-repair-1.today
entista-esp.today
vto.stream
loud-computing-intl-3455364.fyi
9790.club
us-inbox-messages.online
aser-hair-removal-90284.bond
etangkhap99.lol
leaningjobs-cz.today
nline-courses-classes-lv-1.bond
essislotgoal14.xyz
ridges-freezers-56090.bond
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1476-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1476-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1164-21-0x00000000003E0000-0x000000000040F000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 62 1164 cscript.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5036 set thread context of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 1476 set thread context of 3416 1476 ENQ-2024e-HRZ.exe 56 PID 1164 set thread context of 3416 1164 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ENQ-2024e-HRZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1476 ENQ-2024e-HRZ.exe 1476 ENQ-2024e-HRZ.exe 1476 ENQ-2024e-HRZ.exe 1476 ENQ-2024e-HRZ.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe 1164 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1476 ENQ-2024e-HRZ.exe 1476 ENQ-2024e-HRZ.exe 1476 ENQ-2024e-HRZ.exe 1164 cscript.exe 1164 cscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1476 ENQ-2024e-HRZ.exe Token: SeDebugPrivilege 1164 cscript.exe Token: SeShutdownPrivilege 3416 Explorer.EXE Token: SeCreatePagefilePrivilege 3416 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3416 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 5036 wrote to memory of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 5036 wrote to memory of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 5036 wrote to memory of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 5036 wrote to memory of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 5036 wrote to memory of 1476 5036 ENQ-2024e-HRZ.exe 89 PID 3416 wrote to memory of 1164 3416 Explorer.EXE 90 PID 3416 wrote to memory of 1164 3416 Explorer.EXE 90 PID 3416 wrote to memory of 1164 3416 Explorer.EXE 90 PID 1164 wrote to memory of 3248 1164 cscript.exe 91 PID 1164 wrote to memory of 3248 1164 cscript.exe 91 PID 1164 wrote to memory of 3248 1164 cscript.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\ENQ-2024e-HRZ.exe"C:\Users\Admin\AppData\Local\Temp\ENQ-2024e-HRZ.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\ENQ-2024e-HRZ.exe"C:\Users\Admin\AppData\Local\Temp\ENQ-2024e-HRZ.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ENQ-2024e-HRZ.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-