Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe
Resource
win7-20241010-en
General
-
Target
53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe
-
Size
2.2MB
-
MD5
ba353539a8f310d60005f004fb94e24f
-
SHA1
ca7006f2345678b15cdaa3fd0e70ec6d05862930
-
SHA256
53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03
-
SHA512
1e1e14b2f00253cb3df5dbe134240d9974992911b9494a620944c9d8036dcf4da14acace197524ccd13826a097c2ad5fe6f441bb46cbaa860b1512279401442a
-
SSDEEP
24576:5Mq5HYOYUAm1yHBTjstd5nr6rn9VCZvlB1DfA+D0EdPrxPkMN0V9khzb+xHBmN+B:P5DTVYBTKYn9VuvlDjZdhN0T0zbmENn
Malware Config
Extracted
formbook
4.1
nurs
caixinhascomcarinho.com
abinotools.com
oporto-tours.com
iruos.com
yesmamawinebar.com
wwwscu.com
habit2impact.com
antigenresearch.com
ux4space.com
diarypisces.com
cryptopers.com
lovingmoreband.com
beerwars.net
ascariproject.site
livesoccerhd.info
bluestardivingschool.com
pluik.com
snorrky.space
lcoi9.com
phantomxr.com
billingandinvoicing-d.space
sdcvbk.online
ozoraa.tech
chroniclesmagazine.net
hlamarwillis.com
tavolosmart.com
petrouzinexmail.com
nord-income.com
boatlifestyle.life
kangenionizedwater.com
cassandrestlouis.com
nicodemusandcrow.com
yodercontractors.com
trendingwithtom.com
amazondeserthotsprings.com
ietsiemooishop.com
yuqifudemao.online
rdf-group.com
jukerounisexsalon.com
lunarphase-aroma.com
charmapa.com
pimcoclients-au.com
denmarktennessee.com
practicalfpa.biz
mdjwa.com
aerobalear.com
hotgirlseeking.online
upscalee.com
northerntohoku-cartours.com
bestcomposable.com
hgjjglq.com
biggabytes.com
positiveenergyart.com
gastries.info
jamestaylorcreative.com
oolsoojeed-ihissoavaj.online
teoshotthis.com
freetinytools.com
keyupstudio.com
nakiavolaris.store
lifewithlenaivie.com
meysisupplierberas.com
akannroyal.xyz
cultivayoga.store
truckdued.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4428-8927-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Acoofgeqa = "\"C:\\Users\\Admin\\AppData\\Roaming\\Ajhuxiadvy\\Acoofgeqa.exe\"" 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 548 set thread context of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2160 powershell.exe 2160 powershell.exe 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 4428 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 4428 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe Token: SeDebugPrivilege 2160 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 548 wrote to memory of 2160 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 86 PID 548 wrote to memory of 2160 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 86 PID 548 wrote to memory of 2160 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 86 PID 548 wrote to memory of 3848 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 99 PID 548 wrote to memory of 3848 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 99 PID 548 wrote to memory of 3848 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 99 PID 548 wrote to memory of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100 PID 548 wrote to memory of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100 PID 548 wrote to memory of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100 PID 548 wrote to memory of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100 PID 548 wrote to memory of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100 PID 548 wrote to memory of 4428 548 53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe"C:\Users\Admin\AppData\Local\Temp\53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exeC:\Users\Admin\AppData\Local\Temp\53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe2⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exeC:\Users\Admin\AppData\Local\Temp\53d558b2f939bfce7dc3b9d6fdf0cfd92d966bcc7c3cb38e9a0171ef6f778a03.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82