Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07NZTB1lYJ3GNVY.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240729-en
General
-
Target
07NZTB1lYJ3GNVY.exe
-
Size
1.1MB
-
MD5
3452e570af3991f472169eee6c203c1e
-
SHA1
049ac3139640b3df7c840d2c24daff9dd094f779
-
SHA256
477ca79c48c0ae888a5da641e5fbabc7d7c8ba7100e77a9b09cc66719360b086
-
SHA512
4cf1057e557b640b5cbc9c1face2a90ce95b623f495101eb8db4e7b24503f6b3490916b214ed8baaee888cbe7e3a33c0c03010f4654e6bffc58b8b048aa11455
-
SSDEEP
24576:IkxmQl/6CFEjy+viaAlPVW4XwHwcGXJoRx:IkxvlZFEjRKaItXAG5oRx
Malware Config
Extracted
formbook
roz2
jTSEx/DqnWrhnUQ0UQ==
+8219xzGmr2teTrY+fSBK+NOiLc=
/6YHkqNBJiBHvzaT9f2W
56INgrlbOqaBFx2UX/U=
g0J6uduFMzkyC89A1m8MyELra5CYkg==
WAvnVEtqSgNq4NWIGAXQDw==
rlIzjaLSfvwnMJi2
hfKU4ncqea/ITgg=
YNFrxuPv2d1k/QOeQJqGeyg=
t0g0iJ7Nd90i20hzLkEVRcDa
1FRIgZcmCDwh9ACnP5qGeyg=
DgycCCcM7dZP0NaJOpqGeyg=
Hv2jETNeVgEnMJi2
iQT+U40uH2BeEMBvoaNh2I7D
B47/RHqHdm7inUQ0UQ==
HNWL4RdJKOonMJi2
E42gATYJ7NxBxcCv01T/Y925Vnt0
P/rfWIvXyITjrXNcBASU
3pfoX4MmDD0TnTKT9f2W
YevnQ1Wrj/z3k04K1GUjjiA=
MuKvIldmSj0K0L+62odazPSurP+sFKHHDg==
8rSIofZPDEhYHx2UX/U=
/KLkN0PEph4iw3DVICLGGA==
ujiq9f/c8joQfO8SwYJBjT8=
/oaP6vdSJ2frWB8=
4LlHvOebBSyiGg==
0YRCsubfjUKTIlxO2vCGAtZ6Pg==
9qR91xPAm8G8gzqqR+Z8KeNOiLc=
zjjaTXmHe3LinUQ0UQ==
51K+Cx4D9Olh5uGNGAXQDw==
UwgrWsiqdn0=
vHMxcJn/7WixbN0wGAXQDw==
ZFm+CGPuR78nMJi2
vay/SIXu6WdQ01C6urxiHNa5Vnt0
jXj6Xo9J7uC5cjeyQ5qGeyg=
jXx9puqzj7WQnUQ0UQ==
NuU1ptlhPrzJYhSx1ZqGeyg=
p1gyss2bdrioMB2UX/U=
cO4GkaSJOOwnMJi2
gzwVb4TBfwIPlyZT8+l/K9y5Vnt0
xHsqf8oZ/qkGzj++7vV2Kty5Vnt0
iTmD3R3ezBf8hBM5yeeGAtZ6Pg==
6p+B8B6Uhq/ITgg=
xB7bQGltJ+pZ0cRvJ9iOeHyyK2tahQ==
KraRoyp2G+ZVSh2UX/U=
DMWR7jSHXxBh2AQyGAXQDw==
W+FLo+GbBSyiGg==
3aDNCSwVABQL1pMOyFXy+ONOiLc=
nlrKP24rltS3c14BpeKmqFQGNg==
CwQEQ59oUqB7BLx4Q5qGeyg=
OuhCp+3OgnLnnUQ0UQ==
7LWZED2pmvwA1KpFSUsVRcDa
LvDKIiyPcPR0RqsNd3MIqy0=
SsBt21971QFwAw==
7NUbKzliQPpZI6gDyeaGAtZ6Pg==
9qBQnvoO3SRd
gTZtuxSgD+Ex8OiHBJghMuXQ
FcCmJl2rbt+YZyKpP5qGeyg=
dyxcp+e1l9q2MKwNkbmIdSk=
CACQwy7vzQqofTKmPpqGeyg=
IeMvrAfNfWLPaKPB02X+++NOiLc=
nxI3kZcBsK/ITgg=
25ZgwwJBJ+onMJi2
2cPUXpvQffonMJi2
erosludi.net
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2344-14-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral1/memory/2344-18-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral1/memory/2196-23-0x0000000000080000-0x00000000000AD000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
07NZTB1lYJ3GNVY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo\Nation 07NZTB1lYJ3GNVY.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2092 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
07NZTB1lYJ3GNVY.exe07NZTB1lYJ3GNVY.exenetsh.exedescription pid process target process PID 2432 set thread context of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2344 set thread context of 1204 2344 07NZTB1lYJ3GNVY.exe Explorer.EXE PID 2196 set thread context of 1204 2196 netsh.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
07NZTB1lYJ3GNVY.exenetsh.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07NZTB1lYJ3GNVY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
07NZTB1lYJ3GNVY.exenetsh.exepid process 2344 07NZTB1lYJ3GNVY.exe 2344 07NZTB1lYJ3GNVY.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe 2196 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
07NZTB1lYJ3GNVY.exenetsh.exepid process 2344 07NZTB1lYJ3GNVY.exe 2344 07NZTB1lYJ3GNVY.exe 2344 07NZTB1lYJ3GNVY.exe 2196 netsh.exe 2196 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
07NZTB1lYJ3GNVY.exenetsh.exedescription pid process Token: SeDebugPrivilege 2344 07NZTB1lYJ3GNVY.exe Token: SeDebugPrivilege 2196 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
07NZTB1lYJ3GNVY.exeExplorer.EXEnetsh.exedescription pid process target process PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2432 wrote to memory of 2344 2432 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1204 wrote to memory of 2196 1204 Explorer.EXE netsh.exe PID 1204 wrote to memory of 2196 1204 Explorer.EXE netsh.exe PID 1204 wrote to memory of 2196 1204 Explorer.EXE netsh.exe PID 1204 wrote to memory of 2196 1204 Explorer.EXE netsh.exe PID 2196 wrote to memory of 2092 2196 netsh.exe cmd.exe PID 2196 wrote to memory of 2092 2196 netsh.exe cmd.exe PID 2196 wrote to memory of 2092 2196 netsh.exe cmd.exe PID 2196 wrote to memory of 2092 2196 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2092
-
-