Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07NZTB1lYJ3GNVY.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240729-en
General
-
Target
07NZTB1lYJ3GNVY.exe
-
Size
1.1MB
-
MD5
3452e570af3991f472169eee6c203c1e
-
SHA1
049ac3139640b3df7c840d2c24daff9dd094f779
-
SHA256
477ca79c48c0ae888a5da641e5fbabc7d7c8ba7100e77a9b09cc66719360b086
-
SHA512
4cf1057e557b640b5cbc9c1face2a90ce95b623f495101eb8db4e7b24503f6b3490916b214ed8baaee888cbe7e3a33c0c03010f4654e6bffc58b8b048aa11455
-
SSDEEP
24576:IkxmQl/6CFEjy+viaAlPVW4XwHwcGXJoRx:IkxvlZFEjRKaItXAG5oRx
Malware Config
Extracted
formbook
roz2
jTSEx/DqnWrhnUQ0UQ==
+8219xzGmr2teTrY+fSBK+NOiLc=
/6YHkqNBJiBHvzaT9f2W
56INgrlbOqaBFx2UX/U=
g0J6uduFMzkyC89A1m8MyELra5CYkg==
WAvnVEtqSgNq4NWIGAXQDw==
rlIzjaLSfvwnMJi2
hfKU4ncqea/ITgg=
YNFrxuPv2d1k/QOeQJqGeyg=
t0g0iJ7Nd90i20hzLkEVRcDa
1FRIgZcmCDwh9ACnP5qGeyg=
DgycCCcM7dZP0NaJOpqGeyg=
Hv2jETNeVgEnMJi2
iQT+U40uH2BeEMBvoaNh2I7D
B47/RHqHdm7inUQ0UQ==
HNWL4RdJKOonMJi2
E42gATYJ7NxBxcCv01T/Y925Vnt0
P/rfWIvXyITjrXNcBASU
3pfoX4MmDD0TnTKT9f2W
YevnQ1Wrj/z3k04K1GUjjiA=
MuKvIldmSj0K0L+62odazPSurP+sFKHHDg==
8rSIofZPDEhYHx2UX/U=
/KLkN0PEph4iw3DVICLGGA==
ujiq9f/c8joQfO8SwYJBjT8=
/oaP6vdSJ2frWB8=
4LlHvOebBSyiGg==
0YRCsubfjUKTIlxO2vCGAtZ6Pg==
9qR91xPAm8G8gzqqR+Z8KeNOiLc=
zjjaTXmHe3LinUQ0UQ==
51K+Cx4D9Olh5uGNGAXQDw==
UwgrWsiqdn0=
vHMxcJn/7WixbN0wGAXQDw==
ZFm+CGPuR78nMJi2
vay/SIXu6WdQ01C6urxiHNa5Vnt0
jXj6Xo9J7uC5cjeyQ5qGeyg=
jXx9puqzj7WQnUQ0UQ==
NuU1ptlhPrzJYhSx1ZqGeyg=
p1gyss2bdrioMB2UX/U=
cO4GkaSJOOwnMJi2
gzwVb4TBfwIPlyZT8+l/K9y5Vnt0
xHsqf8oZ/qkGzj++7vV2Kty5Vnt0
iTmD3R3ezBf8hBM5yeeGAtZ6Pg==
6p+B8B6Uhq/ITgg=
xB7bQGltJ+pZ0cRvJ9iOeHyyK2tahQ==
KraRoyp2G+ZVSh2UX/U=
DMWR7jSHXxBh2AQyGAXQDw==
W+FLo+GbBSyiGg==
3aDNCSwVABQL1pMOyFXy+ONOiLc=
nlrKP24rltS3c14BpeKmqFQGNg==
CwQEQ59oUqB7BLx4Q5qGeyg=
OuhCp+3OgnLnnUQ0UQ==
7LWZED2pmvwA1KpFSUsVRcDa
LvDKIiyPcPR0RqsNd3MIqy0=
SsBt21971QFwAw==
7NUbKzliQPpZI6gDyeaGAtZ6Pg==
9qBQnvoO3SRd
gTZtuxSgD+Ex8OiHBJghMuXQ
FcCmJl2rbt+YZyKpP5qGeyg=
dyxcp+e1l9q2MKwNkbmIdSk=
CACQwy7vzQqofTKmPpqGeyg=
IeMvrAfNfWLPaKPB02X+++NOiLc=
nxI3kZcBsK/ITgg=
25ZgwwJBJ+onMJi2
2cPUXpvQffonMJi2
erosludi.net
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4864-14-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral2/memory/4864-19-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral2/memory/1720-25-0x0000000000DD0000-0x0000000000DFD000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 07NZTB1lYJ3GNVY.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1596 set thread context of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 4864 set thread context of 3568 4864 07NZTB1lYJ3GNVY.exe 56 PID 1720 set thread context of 3568 1720 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07NZTB1lYJ3GNVY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4864 07NZTB1lYJ3GNVY.exe 4864 07NZTB1lYJ3GNVY.exe 4864 07NZTB1lYJ3GNVY.exe 4864 07NZTB1lYJ3GNVY.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe 1720 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4864 07NZTB1lYJ3GNVY.exe 4864 07NZTB1lYJ3GNVY.exe 4864 07NZTB1lYJ3GNVY.exe 1720 wscript.exe 1720 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4864 07NZTB1lYJ3GNVY.exe Token: SeDebugPrivilege 1720 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 1596 wrote to memory of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 1596 wrote to memory of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 1596 wrote to memory of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 1596 wrote to memory of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 1596 wrote to memory of 4864 1596 07NZTB1lYJ3GNVY.exe 91 PID 3568 wrote to memory of 1720 3568 Explorer.EXE 92 PID 3568 wrote to memory of 1720 3568 Explorer.EXE 92 PID 3568 wrote to memory of 1720 3568 Explorer.EXE 92 PID 1720 wrote to memory of 4316 1720 wscript.exe 93 PID 1720 wrote to memory of 4316 1720 wscript.exe 93 PID 1720 wrote to memory of 4316 1720 wscript.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-