Analysis
-
max time kernel
50s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe
Resource
win7-20241010-en
General
-
Target
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe
-
Size
620KB
-
MD5
ca5d33e8a379da31c0dda6b9e22c20ae
-
SHA1
8501cc96684dafbcbf44abe4af3b4465bb5473d2
-
SHA256
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851
-
SHA512
c4d830968ab1995eea43125273cafb28667bf163ed2af72c9315de5282ecde0f8abb312ccfe7c243374080554eb44f7d07183647c64bc08d4d3f98f9b0bc76f5
-
SSDEEP
12288:HMqFq1lshI14m+PfCANS543LUnHQQZY278xICTtag9oB4:H7+fSmSCcE43gnHQkYjoRB4
Malware Config
Extracted
formbook
4.1
ce18
kenfinnegan.com
exopestireland.com
allthingzbeautiellc.com
attractiveidiot.com
calmsealight.com
ectobyte.com
8rr.xyz
hcmajq.info
alisongraceventures.com
jamtanganbagus.online
forexpropfirmmastery.com
coupimmobilier.com
amarisetechnologies.com
countrykidsclothing.com
eyecatcher.tech
merxip.online
fiteallc.com
themensroombarber.co.uk
seroofingtelford.co.uk
birdie786.com
tinasc.com
abadicash11.vip
beyondschoolwork.com
coachcreators.net
theoakwheel.co.uk
electrolyteelectric.com
bastetribal.com
bleatcement.online
sunsetnyc.com
bjzlccqz.com
loyaldiscount.com
gamerunr.com
keepaquarium.com
ecochec.ru
annakaiello.com
just-leanin.com
kitchen-furniture-66738.com
alibama.top
current-vacanies.com
hentaireaf.com
sim-virtual.net
wilkesalms.org.uk
bishopdelicious.com
dunamu-cabin.com
kessdaniels.com
x7c7h.com
permianmitsubishi.net
logmauk.co.uk
libertyconsul.com
dghg-106.com
bcpatil.com
diamondsilkregimen.com
nankanasaheb.com
incomeclub.africa
login-xfinity.net
fayetaylor.realtor
ljcfarms.africa
g-starnetwork.com
fullmography.com
cleanifylaundry.com
async.live
bigcommerce.rsvp
dominioncard.com
bankloan-dd.ru
bookcom34567875373733744444.top
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2840-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exedescription pid Process procid_target PID 3024 set thread context of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exepowershell.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exepowershell.exepid Process 2840 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 2800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2800 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exedescription pid Process procid_target PID 3024 wrote to memory of 2800 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 29 PID 3024 wrote to memory of 2800 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 29 PID 3024 wrote to memory of 2800 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 29 PID 3024 wrote to memory of 2800 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 29 PID 3024 wrote to memory of 2784 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 31 PID 3024 wrote to memory of 2784 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 31 PID 3024 wrote to memory of 2784 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 31 PID 3024 wrote to memory of 2784 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 31 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33 PID 3024 wrote to memory of 2840 3024 17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe"C:\Users\Admin\AppData\Local\Temp\17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wigzvbLrJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wigzvbLrJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2F2B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe"C:\Users\Admin\AppData\Local\Temp\17ffde8137ccb72df1cf904e6e550a14e03c6e7029a507731a0a721697249851.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e91ab936c5b7960539da370c0dfaaf00
SHA170b85ac505678c9d335db59c26270fdb581e5585
SHA2565e59631cc820a211e0be63355b31b1c07d5a32c8b568866d9b14a09a1affee02
SHA512cf04119286660c8da8fe738111b3a19634c8677b7f220d38ee5c9e38992c5bc984fd5d0c96fed9e110f7d5840a4586d04f28b8f3ddd2e473aadd3322fb9f0d05