Analysis
-
max time kernel
300s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe
Resource
win7-20241010-en
General
-
Target
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe
-
Size
691KB
-
MD5
8f91e7ab8e06bf58adf2509e93159a5d
-
SHA1
2d2fea690c15c4bfe9f9ca4c0b8b8cc509d7daac
-
SHA256
5cd64ae8366b7fa1f1dc762013e0fe8e30caa6c6aa50a0df07cf3a953de6749c
-
SHA512
6bd3689dc70b7a033f152e21c02d5c1ce01db3cd7898d884b24762a90ff2c2c52b5b58853797601fdc4d702a2b557e2d86d098fe7084121da464d48907ef856d
-
SSDEEP
12288:sH3wtfRzxWWgA2ymE5HhizN0PUWesw18zm+gem395mSVb2h17pcU:sHMpzxWNbymCHhizqpeDCgeU9Y
Malware Config
Extracted
formbook
4.1
cd36
hongrobert.top
msurmis.online
tormdamageroof.net
riglashenie-svadby.store
otorcycle-loans-84331.bond
ouriptv.info
eportingcfo.top
2019.vip
ysphoto.online
hrivegorevx.info
350yhc.top
mwakop.xyz
antan4d-amp.xyz
pc-marketing-95267.bond
cuway.tours
inshiaward.top
akuzainu.fun
scenario.live
arrowlaboratorio.shop
nline-gaming-13926.bond
uckycmr123.xyz
eal-estate-71071.bond
adofirma.store
370.pictures
el998.top
beq-ytxr.net
ishwashing-jobs-hunt.world
cn.info
scyg.icu
ilca.xyz
nfine.art
idianledger.top
uycarpaylater-02-t1e-01.today
zygm97014.vip
aofkl.top
gro-smart.online
ranino.coffee
ruckingandhauling.net
ikihousecanada.shop
warmsnetwork.xyz
685830426.shop
ourpetbliss.store
issionzyq.site
uanggermany.top
ottostar.site
elding-jobs-snap.world
apsearch.world
an-portfolio.site
atinclubazul.xyz
rojektx.world
nline-advertising-55292.bond
ittlelou.store
sas.live
09ms.com
hl-com-mx.top
ncovc.info
ovemeone.space
otorcycle-loans-32384.bond
aksghfa56.shop
s-nova.net
aycetastytime.online
arkasgaransi.cfd
ome-care-51533.bond
elsyynp.top
amesnow7.online
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/516-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/516-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/516-22-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2716-24-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2728 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exeBOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exewlanext.exedescription pid Process procid_target PID 2060 set thread context of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 516 set thread context of 1272 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 21 PID 516 set thread context of 1272 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 21 PID 2716 set thread context of 1272 2716 wlanext.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exepowershell.exeBOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exewlanext.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exepowershell.exewlanext.exepid Process 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 2768 powershell.exe 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe 2716 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exewlanext.exepid Process 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 2716 wlanext.exe 2716 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exepowershell.exewlanext.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2716 wlanext.exe Token: SeShutdownPrivilege 1272 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exeBOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exewlanext.exedescription pid Process procid_target PID 2060 wrote to memory of 2768 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 31 PID 2060 wrote to memory of 2768 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 31 PID 2060 wrote to memory of 2768 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 31 PID 2060 wrote to memory of 2768 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 31 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 2060 wrote to memory of 516 2060 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 33 PID 516 wrote to memory of 2716 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 34 PID 516 wrote to memory of 2716 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 34 PID 516 wrote to memory of 2716 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 34 PID 516 wrote to memory of 2716 516 BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe 34 PID 2716 wrote to memory of 2728 2716 wlanext.exe 35 PID 2716 wrote to memory of 2728 2716 wlanext.exe 35 PID 2716 wrote to memory of 2728 2716 wlanext.exe 35 PID 2716 wrote to memory of 2728 2716 wlanext.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"C:\Users\Admin\AppData\Local\Temp\BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"C:\Users\Admin\AppData\Local\Temp\BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BOQ & SPECS-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
-