Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe
Resource
win7-20240903-en
General
-
Target
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe
-
Size
771KB
-
MD5
a6718dd552a34001f40ced365b16d1ee
-
SHA1
f40747dd6f9bd62751bc2b9734dd5bbe8e92723a
-
SHA256
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b
-
SHA512
fbca66394755bf974e7abe6f215048e7f19ae2b9630036e0e04fc2e420332f2f40f84de4dfb78b65c41f9855dd3963513efad1395a5cfaf73616a0dfeff9ddf5
-
SSDEEP
12288:RblmTdKCcfCQtVKr2hXFn+8WnTN77B2qjsH0y:xlmAdE291+86d
Malware Config
Extracted
formbook
4.1
o17i
chocolatebarreview.com
fetch-a-trabajos-canada.info
expresspestcontrol.net
tractionx.co.uk
vitalassetsecurity.com
lahtawine.ru
firedamagereports.com
bentzenphotography.com
digitalworkforces.com
divnoe.online
efefbig.buzz
melhardy.co.uk
igorsolutions.com
developmentszhuiservice.com
fookspace.com
kredaroo.com
4zpm.xyz
kycecat.cfd
singingriverhomeimprovement.com
bils.store
abvqwrtqwt.com
agenciaibdig.online
azsxslife.com
deadstar.cloud
dralexisdvm.com
investea.uk
lovemichigancity.com
imcas.academy
cicero.store
handgab.com
femalefinancialcollective.com
fullblu.com
betonbajas.info
olawaleojewumi.africa
chrissyadamsrealestate.com
kx1898.com
efefcoal.buzz
cartec-2023.com
laptops-67575.com
gadexperts.com
clients-web.com
wwwinterbahis1075.com
locvu.xyz
ctjh0p9.vip
loyaltysouls.com
gction.online
funerverso.net
chargingpiles.shop
gyekkh.cfd
38jsz.com
drdoctormedia.com
732694.com
usapaperballot.com
apexbiomedicaltech.com
knowchaos.com
shaedonaldson.net
76999.biz
doitalllandscapingllc.com
compts.top
fuelforhealth.se
gofundhouse.com
vapecanal.co.uk
furniturecomponent.asia
searo.co.uk
internet-providers-45067.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3312-25-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exedescription pid Process procid_target PID 4500 set thread context of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exepowershell.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exepid Process 3260 powershell.exe 3312 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 3312 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 3260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 3260 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exedescription pid Process procid_target PID 4500 wrote to memory of 3260 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 95 PID 4500 wrote to memory of 3260 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 95 PID 4500 wrote to memory of 3260 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 95 PID 4500 wrote to memory of 3472 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 97 PID 4500 wrote to memory of 3472 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 97 PID 4500 wrote to memory of 3472 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 97 PID 4500 wrote to memory of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99 PID 4500 wrote to memory of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99 PID 4500 wrote to memory of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99 PID 4500 wrote to memory of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99 PID 4500 wrote to memory of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99 PID 4500 wrote to memory of 3312 4500 8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe"C:\Users\Admin\AppData\Local\Temp\8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WBJIjC.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WBJIjC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp342A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe"C:\Users\Admin\AppData\Local\Temp\8f61fd5ce3c2fa9186c75e703ce9e38d66538b9fe2214dd78d2df4c2c7cbda1b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5020405e568db0f7fa897222c7de3af2f
SHA156a4728098b01ca8ef02e09050399bdaf632d7b3
SHA2563c325830615e5a929034622d68b13e910b0335efe04179dfe2d5f2797dac6297
SHA51250456a18f715c35a8ee84231f4ed0ac88df83340ed7945be583abc41e35eabd8dbefacd329ea485a1d9a53c8de4c72d5d638a97005f35859888a60d724b8be0f