Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
M12464.exe
Resource
win7-20240903-en
General
-
Target
M12464.exe
-
Size
743KB
-
MD5
b3055c75b563421ec8cc8ec1f4ef8390
-
SHA1
4414bb16c23fd366404549b06f4d167aa1e86109
-
SHA256
4af0929bd0f58119fc1d0a81205f20e32411d76eedca5bc5a3547cb9707a0f50
-
SHA512
0343b4e8940f782839e8173152563397a9c8c6c450f372b02e127b37ac8173209e9843c181556865584bb12abc181895efae4e08a2e48bc2d08e80704f77b545
-
SSDEEP
12288:wnCb+eCSmttm1P+jXIrBz1HwN2MIKLD4eRV8HenDqfHMHTlsp9byUdOUR0:wuC7tR2XHbMR0UVWfMzlspx9dtR0
Malware Config
Extracted
formbook
4.1
hy29
obswell.online
etflix.luxury
ulunguwethu.store
ulbcenter.shop
nswering-service-mi-de-tt.click
upport-marketplace84.click
wepxbd163.lat
mplants-doctors.today
aofexf90yj.top
hermodynamic.space
dfg3n489.cyou
off.gay
alkak.cam
ijanarko.net
7tl.site
yaanincma.store
ires-47022.bond
elek4dalt77.xyz
foxsakepeople.online
ndefeatedqs.shop
ordseetouristik.reisen
eviewmywebsite.xyz
igitalcommandos.net
eqtech.net
5655600.xyz
rbis.site
entures-sharp.today
atrixslotviral.xyz
zrk148.ink
nline-advertising-18349.bond
unnify.net
ylosnackpark.online
sakasouzoku.net
emonslayerlatinclub.xyz
tus.live
tm189vip.live
eintix.store
oinflogo.xyz
nline-gaming-16655.bond
uyglp.one
ihjp69483.vip
n6n.xyz
veriox.xyz
limtightwaistkh.shop
roelitecraft.mom
eifeigou.top
inak.net
audesa.shop
ealclick.club
oktopus.kids
elisiaco.shop
xvsk.global
littlebitoffaith.net
dc188link04.xyz
tagprobe.band
orldlullaby.net
hswe.top
ultankinglogin.world
ustdoit.store
bhishekanand.biz
erminalplanner.app
oopia-faktura.info
a-consulting.online
owboyaero.net
84jys301.top
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2112-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2112-34-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2224-65-0x0000000000820000-0x000000000084F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
M12464.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation M12464.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
M12464.exeM12464.execmmon32.exedescription pid Process procid_target PID 4356 set thread context of 2112 4356 M12464.exe 93 PID 2112 set thread context of 3420 2112 M12464.exe 56 PID 2224 set thread context of 3420 2224 cmmon32.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
M12464.exepowershell.exeschtasks.execmmon32.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M12464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
M12464.exepowershell.execmmon32.exepid Process 2112 M12464.exe 2112 M12464.exe 2112 M12464.exe 2112 M12464.exe 4268 powershell.exe 4268 powershell.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe 2224 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
M12464.execmmon32.exepid Process 2112 M12464.exe 2112 M12464.exe 2112 M12464.exe 2224 cmmon32.exe 2224 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exeM12464.execmmon32.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 4268 powershell.exe Token: SeDebugPrivilege 2112 M12464.exe Token: SeDebugPrivilege 2224 cmmon32.exe Token: SeShutdownPrivilege 3420 Explorer.EXE Token: SeCreatePagefilePrivilege 3420 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
M12464.exeExplorer.EXEcmmon32.exedescription pid Process procid_target PID 4356 wrote to memory of 4268 4356 M12464.exe 89 PID 4356 wrote to memory of 4268 4356 M12464.exe 89 PID 4356 wrote to memory of 4268 4356 M12464.exe 89 PID 4356 wrote to memory of 4996 4356 M12464.exe 91 PID 4356 wrote to memory of 4996 4356 M12464.exe 91 PID 4356 wrote to memory of 4996 4356 M12464.exe 91 PID 4356 wrote to memory of 2112 4356 M12464.exe 93 PID 4356 wrote to memory of 2112 4356 M12464.exe 93 PID 4356 wrote to memory of 2112 4356 M12464.exe 93 PID 4356 wrote to memory of 2112 4356 M12464.exe 93 PID 4356 wrote to memory of 2112 4356 M12464.exe 93 PID 4356 wrote to memory of 2112 4356 M12464.exe 93 PID 3420 wrote to memory of 2224 3420 Explorer.EXE 94 PID 3420 wrote to memory of 2224 3420 Explorer.EXE 94 PID 3420 wrote to memory of 2224 3420 Explorer.EXE 94 PID 2224 wrote to memory of 1140 2224 cmmon32.exe 95 PID 2224 wrote to memory of 1140 2224 cmmon32.exe 95 PID 2224 wrote to memory of 1140 2224 cmmon32.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\M12464.exe"C:\Users\Admin\AppData\Local\Temp\M12464.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JRDVLXiqHJ.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JRDVLXiqHJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB75.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\M12464.exe"C:\Users\Admin\AppData\Local\Temp\M12464.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\M12464.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD57c2d3cde028aa4b0270c9767cd6d5917
SHA1ddf9453265ff6eb5cc9fe4ec104e8a32f139fcb0
SHA256d1f07477bcc40a8a9aa61eac4363139ee5f13563182bf2552c69c65dfb2c0bd6
SHA512c121b199138e8326b7436a827a83368c7526d8c18bccbfb78e61238b3a15899f776f17009fcc083eeeb9a6499982c7a0234ac16829586b85881bac5dc7611273