Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07NZTB1lYJ3GNVY.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07NZTB1lYJ3GNVY.exe
Resource
win7-20240729-en
General
-
Target
07NZTB1lYJ3GNVY.exe
-
Size
1.1MB
-
MD5
3452e570af3991f472169eee6c203c1e
-
SHA1
049ac3139640b3df7c840d2c24daff9dd094f779
-
SHA256
477ca79c48c0ae888a5da641e5fbabc7d7c8ba7100e77a9b09cc66719360b086
-
SHA512
4cf1057e557b640b5cbc9c1face2a90ce95b623f495101eb8db4e7b24503f6b3490916b214ed8baaee888cbe7e3a33c0c03010f4654e6bffc58b8b048aa11455
-
SSDEEP
24576:IkxmQl/6CFEjy+viaAlPVW4XwHwcGXJoRx:IkxvlZFEjRKaItXAG5oRx
Malware Config
Extracted
formbook
roz2
jTSEx/DqnWrhnUQ0UQ==
+8219xzGmr2teTrY+fSBK+NOiLc=
/6YHkqNBJiBHvzaT9f2W
56INgrlbOqaBFx2UX/U=
g0J6uduFMzkyC89A1m8MyELra5CYkg==
WAvnVEtqSgNq4NWIGAXQDw==
rlIzjaLSfvwnMJi2
hfKU4ncqea/ITgg=
YNFrxuPv2d1k/QOeQJqGeyg=
t0g0iJ7Nd90i20hzLkEVRcDa
1FRIgZcmCDwh9ACnP5qGeyg=
DgycCCcM7dZP0NaJOpqGeyg=
Hv2jETNeVgEnMJi2
iQT+U40uH2BeEMBvoaNh2I7D
B47/RHqHdm7inUQ0UQ==
HNWL4RdJKOonMJi2
E42gATYJ7NxBxcCv01T/Y925Vnt0
P/rfWIvXyITjrXNcBASU
3pfoX4MmDD0TnTKT9f2W
YevnQ1Wrj/z3k04K1GUjjiA=
MuKvIldmSj0K0L+62odazPSurP+sFKHHDg==
8rSIofZPDEhYHx2UX/U=
/KLkN0PEph4iw3DVICLGGA==
ujiq9f/c8joQfO8SwYJBjT8=
/oaP6vdSJ2frWB8=
4LlHvOebBSyiGg==
0YRCsubfjUKTIlxO2vCGAtZ6Pg==
9qR91xPAm8G8gzqqR+Z8KeNOiLc=
zjjaTXmHe3LinUQ0UQ==
51K+Cx4D9Olh5uGNGAXQDw==
UwgrWsiqdn0=
vHMxcJn/7WixbN0wGAXQDw==
ZFm+CGPuR78nMJi2
vay/SIXu6WdQ01C6urxiHNa5Vnt0
jXj6Xo9J7uC5cjeyQ5qGeyg=
jXx9puqzj7WQnUQ0UQ==
NuU1ptlhPrzJYhSx1ZqGeyg=
p1gyss2bdrioMB2UX/U=
cO4GkaSJOOwnMJi2
gzwVb4TBfwIPlyZT8+l/K9y5Vnt0
xHsqf8oZ/qkGzj++7vV2Kty5Vnt0
iTmD3R3ezBf8hBM5yeeGAtZ6Pg==
6p+B8B6Uhq/ITgg=
xB7bQGltJ+pZ0cRvJ9iOeHyyK2tahQ==
KraRoyp2G+ZVSh2UX/U=
DMWR7jSHXxBh2AQyGAXQDw==
W+FLo+GbBSyiGg==
3aDNCSwVABQL1pMOyFXy+ONOiLc=
nlrKP24rltS3c14BpeKmqFQGNg==
CwQEQ59oUqB7BLx4Q5qGeyg=
OuhCp+3OgnLnnUQ0UQ==
7LWZED2pmvwA1KpFSUsVRcDa
LvDKIiyPcPR0RqsNd3MIqy0=
SsBt21971QFwAw==
7NUbKzliQPpZI6gDyeaGAtZ6Pg==
9qBQnvoO3SRd
gTZtuxSgD+Ex8OiHBJghMuXQ
FcCmJl2rbt+YZyKpP5qGeyg=
dyxcp+e1l9q2MKwNkbmIdSk=
CACQwy7vzQqofTKmPpqGeyg=
IeMvrAfNfWLPaKPB02X+++NOiLc=
nxI3kZcBsK/ITgg=
25ZgwwJBJ+onMJi2
2cPUXpvQffonMJi2
erosludi.net
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral4/memory/4244-14-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral4/memory/4244-19-0x0000000000400000-0x000000000042D000-memory.dmp xloader behavioral4/memory/3476-24-0x0000000000CC0000-0x0000000000CED000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 07NZTB1lYJ3GNVY.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2372 set thread context of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 4244 set thread context of 3516 4244 07NZTB1lYJ3GNVY.exe 56 PID 3476 set thread context of 3516 3476 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07NZTB1lYJ3GNVY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2372 07NZTB1lYJ3GNVY.exe 2372 07NZTB1lYJ3GNVY.exe 2372 07NZTB1lYJ3GNVY.exe 2372 07NZTB1lYJ3GNVY.exe 4244 07NZTB1lYJ3GNVY.exe 4244 07NZTB1lYJ3GNVY.exe 4244 07NZTB1lYJ3GNVY.exe 4244 07NZTB1lYJ3GNVY.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe 3476 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4244 07NZTB1lYJ3GNVY.exe 4244 07NZTB1lYJ3GNVY.exe 4244 07NZTB1lYJ3GNVY.exe 3476 cmmon32.exe 3476 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2372 07NZTB1lYJ3GNVY.exe Token: SeDebugPrivilege 4244 07NZTB1lYJ3GNVY.exe Token: SeDebugPrivilege 3476 cmmon32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2996 2372 07NZTB1lYJ3GNVY.exe 101 PID 2372 wrote to memory of 2996 2372 07NZTB1lYJ3GNVY.exe 101 PID 2372 wrote to memory of 2996 2372 07NZTB1lYJ3GNVY.exe 101 PID 2372 wrote to memory of 3540 2372 07NZTB1lYJ3GNVY.exe 102 PID 2372 wrote to memory of 3540 2372 07NZTB1lYJ3GNVY.exe 102 PID 2372 wrote to memory of 3540 2372 07NZTB1lYJ3GNVY.exe 102 PID 2372 wrote to memory of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 2372 wrote to memory of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 2372 wrote to memory of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 2372 wrote to memory of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 2372 wrote to memory of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 2372 wrote to memory of 4244 2372 07NZTB1lYJ3GNVY.exe 103 PID 3516 wrote to memory of 3476 3516 Explorer.EXE 104 PID 3516 wrote to memory of 3476 3516 Explorer.EXE 104 PID 3516 wrote to memory of 3476 3516 Explorer.EXE 104 PID 3476 wrote to memory of 4344 3476 cmmon32.exe 105 PID 3476 wrote to memory of 4344 3476 cmmon32.exe 105 PID 3476 wrote to memory of 4344 3476 cmmon32.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\07NZTB1lYJ3GNVY.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-