Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
nqyjqo.exe
Resource
win7-20241010-en
General
-
Target
nqyjqo.exe
-
Size
100KB
-
MD5
3d5e9bfede23e9c1b446fc3f9274d764
-
SHA1
0844992797324021269266770a5c77d31f4ae95f
-
SHA256
77a8bd4f7e493bf79ecc66caeabfa0e769c8a236cf67c61c94d5f8c58cc69d3e
-
SHA512
6c8f750bbb4d35c055390d72c3b8232e646390155532517640fa479ee0b2d1891997ff18d26c01a1d66c9d751d3f6215387f1df12d73f0249acdc7827647cb52
-
SSDEEP
3072:qiOJNQvDOGx9jVgAdE9UsbbrkQFqhDJ255C5M4Q:sYDJXgTUmzq+
Malware Config
Extracted
formbook
u6hu
OvIuZKrtOMxghbaZbvb/8h9g+Q==
mjHLVEVO8gwVeZ+7
Lh1lcZzH8pTXgpdDzV0vzyVooAsviHQ=
OzJXhMQYaQKNT1aBY/gM8h9g+Q==
WSJFbX28mK+jXVvRJofdtSc=
mEv6JdT2o7Nq++XYt8MFpx5QrhRdhA==
Wxf/NnjMRlBj6JK3jg==
nB21Q0tg7gEVeZ+7
IZinOswGUPAn51eHvCAoMetC
INxV9PYg7AQP0xyDAyg=
kkZP+Iq1AgMVeZ+7
meuru6sSaxxuoLS7gA==
y0jMTFyffedqCSRXVfm/
sJbTfRVKuQScxw==
+ecHP3ayIjYFnb7j2Pt6z5dK
uZnHRwRE9QwVeZ+7
ZBg6Sy054P4oHp0DknCx
nFXn8j4yTuJ9aOfNlw==
35ygHt8uASpReRyDAyg=
8nT3T+8eWeh6aOfNlw==
HhIzb7v+M7I5Sqnk5Gt6z5dK
Nd5UBShihWZZDA8=
CcrOdQtKpUrKSJqzig==
T/WOykxDMIU8/Q0=
XBwiL8gHqMd9JUiiX3+9
kpC3/164HctgequkvgoZQw==
enHp66c8IjQ=
aQYGrJLj3msLO5VP2WJqjW7+rhRdhA==
vDXNC+Q7VTNCCxI=
xWh0G6/2cIFB5ufaqTkHqGRN7zt5
jFLwNR5qOoU8/Q0=
IRa5/8L8vs2xLYKx
L5oor6OvWINoLTpfXvf98h9g+Q==
01FVerpZiCu82g==
IshjpT6he6Y9
UNuJ2awhgexLBRA=
kQD/IkhTZoRsfRyDAyg=
wIQ4Yy91Q3xYCDiWvgoZQw==
xJbODWKuFKgLsaGvvgoZQw==
CooPm7PhhIylxy3RGrmDFds77ARo
xHau8nb55cDT1cKz
rWTumLcgL1BSeRyDAyg=
ejPpClNWuQScxw==
oEH5T+cGGqjrNmkVmrI/bi8=
EJKwS83Y4nfe9CuKRmSu
DM2GjMuIuQScxw==
iAWaJTWEiB9Z4RyDAyg=
CtYQsdIzKoU8/Q0=
zpzF/GbBgje3aOfNlw==
F8xug9XSzeDT5pD3RF6q
FqukyevwFLkOyxyDAyg=
QjLUF95BcpCpiK24gA==
vnUTT+0UgexLBRA=
31brkKCS+H4VeZ+7
RQez61BOWa1I+Ac=
OS7mmaK7bIe4j5cqaxQJ8h9g+Q==
rlbMZ37Mq7WXSYSv/iI=
hzTCZITPnqu68El/e4XNnoPr0RJx
hVAJKOpaZsFdDxQ=
O0b/K5Upgg==
jhMiu0550a6bqAu+NYfdtSc=
e8pri9rk9lNKKYkHZe4N8h9g+Q==
7LVrhEajdHxxfRyDAyg=
52hl5Fpec9eCkvqdAiA=
cp12326.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation nqyjqo.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2200 set thread context of 1688 2200 nqyjqo.exe 30 PID 1688 set thread context of 1272 1688 nqyjqo.exe 21 PID 1688 set thread context of 1272 1688 nqyjqo.exe 21 PID 368 set thread context of 1272 368 systray.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqyjqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqyjqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1688 nqyjqo.exe 1688 nqyjqo.exe 1688 nqyjqo.exe 1688 nqyjqo.exe 1688 nqyjqo.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe 368 systray.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2200 nqyjqo.exe 1688 nqyjqo.exe 1688 nqyjqo.exe 1688 nqyjqo.exe 1688 nqyjqo.exe 368 systray.exe 368 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1688 nqyjqo.exe Token: SeDebugPrivilege 368 systray.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1688 2200 nqyjqo.exe 30 PID 2200 wrote to memory of 1688 2200 nqyjqo.exe 30 PID 2200 wrote to memory of 1688 2200 nqyjqo.exe 30 PID 2200 wrote to memory of 1688 2200 nqyjqo.exe 30 PID 2200 wrote to memory of 1688 2200 nqyjqo.exe 30 PID 1688 wrote to memory of 368 1688 nqyjqo.exe 32 PID 1688 wrote to memory of 368 1688 nqyjqo.exe 32 PID 1688 wrote to memory of 368 1688 nqyjqo.exe 32 PID 1688 wrote to memory of 368 1688 nqyjqo.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-