Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
New RFQ 6000333264 (K0060-01).exe
Resource
win7-20240903-en
General
-
Target
New RFQ 6000333264 (K0060-01).exe
-
Size
1.0MB
-
MD5
01202dc54836c255eb5d901d3641e786
-
SHA1
60fdbb2aab5637e9b205a95c2940be264e07ca9f
-
SHA256
6262299f2c4308cc3f69f8e038d68cefb86f7acb0b718d1fe9416244c80b5956
-
SHA512
a95209c85deb8f971883ceea25c2cba9d06bb9d0a0d3141383ff7ef42ad767cc75beb366d5806d0cff62fe63a5079e4e9bfb68f58334ec5cee2de89c6c867b0c
-
SSDEEP
24576:TPxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussC5YTy3b:hYTqEpxnhjiTFdj
Malware Config
Extracted
formbook
ji99
f5hfqPfk5Co4t9g=
A9ql+89lMaIqvdw=
AuXIIWRbGyo4t9g=
UX9Pn/rz8So4t9g=
haAzYKqrYA==
hFdOOodp41DpKN3KlPmz
RA7UPC/1Nn7DtG2nMDC7qzFIqyNH5Q==
nu+6ldzdZuY7Mfy7R1u8
CUY9ntOFDwT+x5cuu7MwUpEX3jX7ycxrTA==
mBzgqeKiuSTnno+ywbU=
EY1SJn9aa2PgEaK8MCv87C1EqA==
eQ63l+wp6FNhJw==
1qqcmBMMW4cTvd71KFxawvWn
CU0a9s95/UP8lFS7yLc=
XnREpeCto+QncjZhqb8=
1GJM69VrRm+DuOdYWJo+Ug==
R6iIYTHZbuA0L+XKlPmz
oamYII2fY5HT3p28AlVawvWn
/f7UheK0ifs3
TSEN9Dv+PmX4hNnx
WvLVs/3i6FznDMg=
4bmWXuR4w/su
MNKdX5RTIGiXMA==
3O67B0gb9yT/8gWCCGVawvWn
AbmD3yIrA0APuxKPU3YSpJo=
zt6bb6WqNTFA+cPv
BhcCb2/rMP9A+cPv
x0oV3B0jffA3cyVBlrY=
IW0iIX5r6+XBqVqdFakIzxVCqA==
sJp7CmlX6FNhJw==
AQDIMKWnc7Go/7PWMqYZw/Sl
RfjEHl8sdm3ILw==
3+CGPSS0ifs3
pFAoBUD+OIECv+qTYw==
cnxz38ORB8L+09Y=
9q6JF/aXntocU+P2
4rxibbKOy0M+NPPQy8XRVWwVtw==
EoR1Uh+fjuFcDbbl
wiQCFnVerd5mM1DYVli7
21MS3hfVIWImCpu+aQ==
SY1VLx/zvkMJmlS7yLc=
soF6ceneVmI9LuXKlPmz
b9KFWZNZrONkoxaNFTuSWA==
O/7dqvm0ifs3
sZxx0xoU7SAj6o8XEGQ9degZXzU=
Zta7mWIFUZKRWF1ugo96GGZT/j0=
Lv7KFuGJywmb1J67vu6zeoM=
d2QNqKFspSQbFBmqdg==
/UpEqf3PHU0hAJeRzgrHiTfeqg==
BCACZ8rhGVwmCpu+aQ==
QkT8TqWKgLzLSA+reA==
jI5eemPElQmBPw==
Gw7iWZ9lHVdvG7E8/SZP5hM1vEDmv/s=
MIVMG0EjmpuVXwiSD483UA==
xefsRxa7x70HFmzDRlq7
lCQNoYY5RaJu6/nxzfs3wTvDoA==
oYwH5bgot+gq
BOK9GueR1hWY1X2A0fOaXJyUWGko
4MqeIHtZKnU5tsrO4kd7GGZT/j0=
H+bInfjwefh0evidZw==
AF4/I/SjY6l08Y8OAE71m5o=
NmFIrejCibC7gD7x/2GQLG4yyCQ=
+kgF5Mpjr94nF8Pycl4GyeOw
gW9P7Y788XLJhcE=
laventuredesam.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation New RFQ 6000333264 (K0060-01).exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2160 set thread context of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2792 set thread context of 1200 2792 New RFQ 6000333264 (K0060-01).exe 21 PID 2792 set thread context of 1200 2792 New RFQ 6000333264 (K0060-01).exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2396 1928 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New RFQ 6000333264 (K0060-01).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe 2792 New RFQ 6000333264 (K0060-01).exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2792 New RFQ 6000333264 (K0060-01).exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 2160 wrote to memory of 2792 2160 New RFQ 6000333264 (K0060-01).exe 30 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1200 wrote to memory of 1928 1200 Explorer.EXE 33 PID 1928 wrote to memory of 2396 1928 msiexec.exe 34 PID 1928 wrote to memory of 2396 1928 msiexec.exe 34 PID 1928 wrote to memory of 2396 1928 msiexec.exe 34 PID 1928 wrote to memory of 2396 1928 msiexec.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1484
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2644
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 2683⤵
- Program crash
PID:2396
-
-