Analysis
-
max time kernel
149s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07NZTB1lYJ3GNVY.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240729-en
General
-
Target
07NZTB1lYJ3GNVY.exe
-
Size
1.1MB
-
MD5
3452e570af3991f472169eee6c203c1e
-
SHA1
049ac3139640b3df7c840d2c24daff9dd094f779
-
SHA256
477ca79c48c0ae888a5da641e5fbabc7d7c8ba7100e77a9b09cc66719360b086
-
SHA512
4cf1057e557b640b5cbc9c1face2a90ce95b623f495101eb8db4e7b24503f6b3490916b214ed8baaee888cbe7e3a33c0c03010f4654e6bffc58b8b048aa11455
-
SSDEEP
24576:IkxmQl/6CFEjy+viaAlPVW4XwHwcGXJoRx:IkxvlZFEjRKaItXAG5oRx
Malware Config
Extracted
formbook
roz2
jTSEx/DqnWrhnUQ0UQ==
+8219xzGmr2teTrY+fSBK+NOiLc=
/6YHkqNBJiBHvzaT9f2W
56INgrlbOqaBFx2UX/U=
g0J6uduFMzkyC89A1m8MyELra5CYkg==
WAvnVEtqSgNq4NWIGAXQDw==
rlIzjaLSfvwnMJi2
hfKU4ncqea/ITgg=
YNFrxuPv2d1k/QOeQJqGeyg=
t0g0iJ7Nd90i20hzLkEVRcDa
1FRIgZcmCDwh9ACnP5qGeyg=
DgycCCcM7dZP0NaJOpqGeyg=
Hv2jETNeVgEnMJi2
iQT+U40uH2BeEMBvoaNh2I7D
B47/RHqHdm7inUQ0UQ==
HNWL4RdJKOonMJi2
E42gATYJ7NxBxcCv01T/Y925Vnt0
P/rfWIvXyITjrXNcBASU
3pfoX4MmDD0TnTKT9f2W
YevnQ1Wrj/z3k04K1GUjjiA=
MuKvIldmSj0K0L+62odazPSurP+sFKHHDg==
8rSIofZPDEhYHx2UX/U=
/KLkN0PEph4iw3DVICLGGA==
ujiq9f/c8joQfO8SwYJBjT8=
/oaP6vdSJ2frWB8=
4LlHvOebBSyiGg==
0YRCsubfjUKTIlxO2vCGAtZ6Pg==
9qR91xPAm8G8gzqqR+Z8KeNOiLc=
zjjaTXmHe3LinUQ0UQ==
51K+Cx4D9Olh5uGNGAXQDw==
UwgrWsiqdn0=
vHMxcJn/7WixbN0wGAXQDw==
ZFm+CGPuR78nMJi2
vay/SIXu6WdQ01C6urxiHNa5Vnt0
jXj6Xo9J7uC5cjeyQ5qGeyg=
jXx9puqzj7WQnUQ0UQ==
NuU1ptlhPrzJYhSx1ZqGeyg=
p1gyss2bdrioMB2UX/U=
cO4GkaSJOOwnMJi2
gzwVb4TBfwIPlyZT8+l/K9y5Vnt0
xHsqf8oZ/qkGzj++7vV2Kty5Vnt0
iTmD3R3ezBf8hBM5yeeGAtZ6Pg==
6p+B8B6Uhq/ITgg=
xB7bQGltJ+pZ0cRvJ9iOeHyyK2tahQ==
KraRoyp2G+ZVSh2UX/U=
DMWR7jSHXxBh2AQyGAXQDw==
W+FLo+GbBSyiGg==
3aDNCSwVABQL1pMOyFXy+ONOiLc=
nlrKP24rltS3c14BpeKmqFQGNg==
CwQEQ59oUqB7BLx4Q5qGeyg=
OuhCp+3OgnLnnUQ0UQ==
7LWZED2pmvwA1KpFSUsVRcDa
LvDKIiyPcPR0RqsNd3MIqy0=
SsBt21971QFwAw==
7NUbKzliQPpZI6gDyeaGAtZ6Pg==
9qBQnvoO3SRd
gTZtuxSgD+Ex8OiHBJghMuXQ
FcCmJl2rbt+YZyKpP5qGeyg=
dyxcp+e1l9q2MKwNkbmIdSk=
CACQwy7vzQqofTKmPpqGeyg=
IeMvrAfNfWLPaKPB02X+++NOiLc=
nxI3kZcBsK/ITgg=
25ZgwwJBJ+onMJi2
2cPUXpvQffonMJi2
erosludi.net
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral3/memory/2800-14-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral3/memory/2800-18-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral3/memory/2800-22-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral3/memory/2704-28-0x0000000000080000-0x00000000000AD000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
07NZTB1lYJ3GNVY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation 07NZTB1lYJ3GNVY.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2288 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
07NZTB1lYJ3GNVY.exe07NZTB1lYJ3GNVY.exesvchost.exedescription pid process target process PID 1744 set thread context of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2800 set thread context of 1236 2800 07NZTB1lYJ3GNVY.exe Explorer.EXE PID 2800 set thread context of 1236 2800 07NZTB1lYJ3GNVY.exe Explorer.EXE PID 2704 set thread context of 1236 2704 svchost.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
07NZTB1lYJ3GNVY.exe07NZTB1lYJ3GNVY.exesvchost.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07NZTB1lYJ3GNVY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07NZTB1lYJ3GNVY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
07NZTB1lYJ3GNVY.exesvchost.exepid process 2800 07NZTB1lYJ3GNVY.exe 2800 07NZTB1lYJ3GNVY.exe 2800 07NZTB1lYJ3GNVY.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe 2704 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
07NZTB1lYJ3GNVY.exesvchost.exepid process 2800 07NZTB1lYJ3GNVY.exe 2800 07NZTB1lYJ3GNVY.exe 2800 07NZTB1lYJ3GNVY.exe 2800 07NZTB1lYJ3GNVY.exe 2704 svchost.exe 2704 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
07NZTB1lYJ3GNVY.exesvchost.exedescription pid process Token: SeDebugPrivilege 2800 07NZTB1lYJ3GNVY.exe Token: SeDebugPrivilege 2704 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
07NZTB1lYJ3GNVY.exe07NZTB1lYJ3GNVY.exesvchost.exedescription pid process target process PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 1744 wrote to memory of 2800 1744 07NZTB1lYJ3GNVY.exe 07NZTB1lYJ3GNVY.exe PID 2800 wrote to memory of 2704 2800 07NZTB1lYJ3GNVY.exe svchost.exe PID 2800 wrote to memory of 2704 2800 07NZTB1lYJ3GNVY.exe svchost.exe PID 2800 wrote to memory of 2704 2800 07NZTB1lYJ3GNVY.exe svchost.exe PID 2800 wrote to memory of 2704 2800 07NZTB1lYJ3GNVY.exe svchost.exe PID 2704 wrote to memory of 2288 2704 svchost.exe cmd.exe PID 2704 wrote to memory of 2288 2704 svchost.exe cmd.exe PID 2704 wrote to memory of 2288 2704 svchost.exe cmd.exe PID 2704 wrote to memory of 2288 2704 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
-