Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
M12464.exe
Resource
win7-20240903-en
General
-
Target
M12464.exe
-
Size
743KB
-
MD5
b3055c75b563421ec8cc8ec1f4ef8390
-
SHA1
4414bb16c23fd366404549b06f4d167aa1e86109
-
SHA256
4af0929bd0f58119fc1d0a81205f20e32411d76eedca5bc5a3547cb9707a0f50
-
SHA512
0343b4e8940f782839e8173152563397a9c8c6c450f372b02e127b37ac8173209e9843c181556865584bb12abc181895efae4e08a2e48bc2d08e80704f77b545
-
SSDEEP
12288:wnCb+eCSmttm1P+jXIrBz1HwN2MIKLD4eRV8HenDqfHMHTlsp9byUdOUR0:wuC7tR2XHbMR0UVWfMzlspx9dtR0
Malware Config
Extracted
formbook
4.1
hy29
obswell.online
etflix.luxury
ulunguwethu.store
ulbcenter.shop
nswering-service-mi-de-tt.click
upport-marketplace84.click
wepxbd163.lat
mplants-doctors.today
aofexf90yj.top
hermodynamic.space
dfg3n489.cyou
off.gay
alkak.cam
ijanarko.net
7tl.site
yaanincma.store
ires-47022.bond
elek4dalt77.xyz
foxsakepeople.online
ndefeatedqs.shop
ordseetouristik.reisen
eviewmywebsite.xyz
igitalcommandos.net
eqtech.net
5655600.xyz
rbis.site
entures-sharp.today
atrixslotviral.xyz
zrk148.ink
nline-advertising-18349.bond
unnify.net
ylosnackpark.online
sakasouzoku.net
emonslayerlatinclub.xyz
tus.live
tm189vip.live
eintix.store
oinflogo.xyz
nline-gaming-16655.bond
uyglp.one
ihjp69483.vip
n6n.xyz
veriox.xyz
limtightwaistkh.shop
roelitecraft.mom
eifeigou.top
inak.net
audesa.shop
ealclick.club
oktopus.kids
elisiaco.shop
xvsk.global
littlebitoffaith.net
dc188link04.xyz
tagprobe.band
orldlullaby.net
hswe.top
ultankinglogin.world
ustdoit.store
bhishekanand.biz
erminalplanner.app
oopia-faktura.info
a-consulting.online
owboyaero.net
84jys301.top
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2024-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1708-25-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2552 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
M12464.exeM12464.exeraserver.exedescription pid Process procid_target PID 2728 set thread context of 2024 2728 M12464.exe 34 PID 2024 set thread context of 1192 2024 M12464.exe 21 PID 2024 set thread context of 1192 2024 M12464.exe 21 PID 1708 set thread context of 1192 1708 raserver.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeM12464.exeraserver.execmd.exeM12464.exepowershell.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M12464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M12464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
M12464.exepowershell.exeraserver.exepid Process 2024 M12464.exe 2024 M12464.exe 2628 powershell.exe 2024 M12464.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe 1708 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
M12464.exeraserver.exepid Process 2024 M12464.exe 2024 M12464.exe 2024 M12464.exe 2024 M12464.exe 1708 raserver.exe 1708 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
M12464.exepowershell.exeraserver.exedescription pid Process Token: SeDebugPrivilege 2024 M12464.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 1708 raserver.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
M12464.exeM12464.exeraserver.exedescription pid Process procid_target PID 2728 wrote to memory of 2628 2728 M12464.exe 30 PID 2728 wrote to memory of 2628 2728 M12464.exe 30 PID 2728 wrote to memory of 2628 2728 M12464.exe 30 PID 2728 wrote to memory of 2628 2728 M12464.exe 30 PID 2728 wrote to memory of 2584 2728 M12464.exe 32 PID 2728 wrote to memory of 2584 2728 M12464.exe 32 PID 2728 wrote to memory of 2584 2728 M12464.exe 32 PID 2728 wrote to memory of 2584 2728 M12464.exe 32 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2728 wrote to memory of 2024 2728 M12464.exe 34 PID 2024 wrote to memory of 1708 2024 M12464.exe 36 PID 2024 wrote to memory of 1708 2024 M12464.exe 36 PID 2024 wrote to memory of 1708 2024 M12464.exe 36 PID 2024 wrote to memory of 1708 2024 M12464.exe 36 PID 1708 wrote to memory of 2552 1708 raserver.exe 37 PID 1708 wrote to memory of 2552 1708 raserver.exe 37 PID 1708 wrote to memory of 2552 1708 raserver.exe 37 PID 1708 wrote to memory of 2552 1708 raserver.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\M12464.exe"C:\Users\Admin\AppData\Local\Temp\M12464.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JRDVLXiqHJ.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JRDVLXiqHJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB432.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\M12464.exe"C:\Users\Admin\AppData\Local\Temp\M12464.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\M12464.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5db5d8e0fce91b187f897fea364288426
SHA136fbfec592fca3bc08d0bfb40036ad352b37e215
SHA25624c7e1771d20103facd5f49e1dca32b09ea955ece80308fd9d4b055415812992
SHA5126aea6ec06e67d58b0f3ae5558d45119ed412ca884995c5dc30a80feff201925315152236d276e1429a29edc3a538f43cac83a9ef9a2beece6e2b73277240a44b