Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
BAT547477.exe
Resource
win7-20240708-en
General
-
Target
BAT547477.exe
-
Size
739KB
-
MD5
6c4334d877979276b2dacdfe2430fc19
-
SHA1
f3e255a94157ee3c9082e224e711563d5dee7284
-
SHA256
9a24b197698ebde37702b2993ea2d1d4b7d2ad327605af58a4b8b266d7d9e827
-
SHA512
3310bb6c789073b286645943a4eed766df5dfc215fd4932666b04a901aa2e6a2ee8775ea00da38ae3c504bcd06faa717ce9eed3c6a381d786029c0df3df2815d
-
SSDEEP
12288:UgWV1EiuSEmbGq/ChgHp0FrKmSUHNR6/GIzhYdx6fLdOL:pWV1EdTmN/ChgHpsrKrUHN0/GIzhYaTU
Malware Config
Extracted
formbook
4.1
hy29
obswell.online
etflix.luxury
ulunguwethu.store
ulbcenter.shop
nswering-service-mi-de-tt.click
upport-marketplace84.click
wepxbd163.lat
mplants-doctors.today
aofexf90yj.top
hermodynamic.space
dfg3n489.cyou
off.gay
alkak.cam
ijanarko.net
7tl.site
yaanincma.store
ires-47022.bond
elek4dalt77.xyz
foxsakepeople.online
ndefeatedqs.shop
ordseetouristik.reisen
eviewmywebsite.xyz
igitalcommandos.net
eqtech.net
5655600.xyz
rbis.site
entures-sharp.today
atrixslotviral.xyz
zrk148.ink
nline-advertising-18349.bond
unnify.net
ylosnackpark.online
sakasouzoku.net
emonslayerlatinclub.xyz
tus.live
tm189vip.live
eintix.store
oinflogo.xyz
nline-gaming-16655.bond
uyglp.one
ihjp69483.vip
n6n.xyz
veriox.xyz
limtightwaistkh.shop
roelitecraft.mom
eifeigou.top
inak.net
audesa.shop
ealclick.club
oktopus.kids
elisiaco.shop
xvsk.global
littlebitoffaith.net
dc188link04.xyz
tagprobe.band
orldlullaby.net
hswe.top
ultankinglogin.world
ustdoit.store
bhishekanand.biz
erminalplanner.app
oopia-faktura.info
a-consulting.online
owboyaero.net
84jys301.top
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2032-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2032-34-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2804-71-0x0000000001220000-0x000000000124F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BAT547477.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BAT547477.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BAT547477.exeBAT547477.exeNETSTAT.EXEdescription pid Process procid_target PID 440 set thread context of 2032 440 BAT547477.exe 106 PID 2032 set thread context of 3456 2032 BAT547477.exe 56 PID 2804 set thread context of 3456 2804 NETSTAT.EXE 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BAT547477.exepowershell.exeschtasks.exeNETSTAT.EXEcmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BAT547477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid Process 2804 NETSTAT.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
powershell.exeBAT547477.exeBAT547477.exeNETSTAT.EXEpid Process 4116 powershell.exe 440 BAT547477.exe 440 BAT547477.exe 440 BAT547477.exe 440 BAT547477.exe 2032 BAT547477.exe 2032 BAT547477.exe 2032 BAT547477.exe 2032 BAT547477.exe 4116 powershell.exe 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE 2804 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
BAT547477.exeNETSTAT.EXEpid Process 2032 BAT547477.exe 2032 BAT547477.exe 2032 BAT547477.exe 2804 NETSTAT.EXE 2804 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
powershell.exeBAT547477.exeBAT547477.exeNETSTAT.EXEExplorer.EXEdescription pid Process Token: SeDebugPrivilege 4116 powershell.exe Token: SeDebugPrivilege 440 BAT547477.exe Token: SeDebugPrivilege 2032 BAT547477.exe Token: SeDebugPrivilege 2804 NETSTAT.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
BAT547477.exeExplorer.EXENETSTAT.EXEdescription pid Process procid_target PID 440 wrote to memory of 4116 440 BAT547477.exe 100 PID 440 wrote to memory of 4116 440 BAT547477.exe 100 PID 440 wrote to memory of 4116 440 BAT547477.exe 100 PID 440 wrote to memory of 4324 440 BAT547477.exe 102 PID 440 wrote to memory of 4324 440 BAT547477.exe 102 PID 440 wrote to memory of 4324 440 BAT547477.exe 102 PID 440 wrote to memory of 1656 440 BAT547477.exe 104 PID 440 wrote to memory of 1656 440 BAT547477.exe 104 PID 440 wrote to memory of 1656 440 BAT547477.exe 104 PID 440 wrote to memory of 1732 440 BAT547477.exe 105 PID 440 wrote to memory of 1732 440 BAT547477.exe 105 PID 440 wrote to memory of 1732 440 BAT547477.exe 105 PID 440 wrote to memory of 2032 440 BAT547477.exe 106 PID 440 wrote to memory of 2032 440 BAT547477.exe 106 PID 440 wrote to memory of 2032 440 BAT547477.exe 106 PID 440 wrote to memory of 2032 440 BAT547477.exe 106 PID 440 wrote to memory of 2032 440 BAT547477.exe 106 PID 440 wrote to memory of 2032 440 BAT547477.exe 106 PID 3456 wrote to memory of 2804 3456 Explorer.EXE 107 PID 3456 wrote to memory of 2804 3456 Explorer.EXE 107 PID 3456 wrote to memory of 2804 3456 Explorer.EXE 107 PID 2804 wrote to memory of 2688 2804 NETSTAT.EXE 109 PID 2804 wrote to memory of 2688 2804 NETSTAT.EXE 109 PID 2804 wrote to memory of 2688 2804 NETSTAT.EXE 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\reWzGfPRXRiIR.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\reWzGfPRXRiIR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4BE.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"3⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"3⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BAT547477.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5de099ab0358cd083734d1099df5a4ff4
SHA199447eaae2a73f805aade74fdf4555796c2f2440
SHA25697c8ede87a9007f7c476c6e4017411deb3a15f641ff515a0d1365d3b4c3f2c74
SHA512a5c31fec95cf224cf33aed7b5da2b7d050eed015c0abb2a7c846bc4c0ed364b45ff43c2480400bb3c9828d67b606940871344ab3ca4af8d56b8eb457b6d5bc7d