Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e29feb7fcc81e09ebf6a86b0d620c54e1a134ab98cbd9c13323bf5a6ae7e9088.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
nqyjqo.exe
Resource
win7-20241010-en
General
-
Target
nqyjqo.exe
-
Size
100KB
-
MD5
3d5e9bfede23e9c1b446fc3f9274d764
-
SHA1
0844992797324021269266770a5c77d31f4ae95f
-
SHA256
77a8bd4f7e493bf79ecc66caeabfa0e769c8a236cf67c61c94d5f8c58cc69d3e
-
SHA512
6c8f750bbb4d35c055390d72c3b8232e646390155532517640fa479ee0b2d1891997ff18d26c01a1d66c9d751d3f6215387f1df12d73f0249acdc7827647cb52
-
SSDEEP
3072:qiOJNQvDOGx9jVgAdE9UsbbrkQFqhDJ255C5M4Q:sYDJXgTUmzq+
Malware Config
Extracted
formbook
u6hu
OvIuZKrtOMxghbaZbvb/8h9g+Q==
mjHLVEVO8gwVeZ+7
Lh1lcZzH8pTXgpdDzV0vzyVooAsviHQ=
OzJXhMQYaQKNT1aBY/gM8h9g+Q==
WSJFbX28mK+jXVvRJofdtSc=
mEv6JdT2o7Nq++XYt8MFpx5QrhRdhA==
Wxf/NnjMRlBj6JK3jg==
nB21Q0tg7gEVeZ+7
IZinOswGUPAn51eHvCAoMetC
INxV9PYg7AQP0xyDAyg=
kkZP+Iq1AgMVeZ+7
meuru6sSaxxuoLS7gA==
y0jMTFyffedqCSRXVfm/
sJbTfRVKuQScxw==
+ecHP3ayIjYFnb7j2Pt6z5dK
uZnHRwRE9QwVeZ+7
ZBg6Sy054P4oHp0DknCx
nFXn8j4yTuJ9aOfNlw==
35ygHt8uASpReRyDAyg=
8nT3T+8eWeh6aOfNlw==
HhIzb7v+M7I5Sqnk5Gt6z5dK
Nd5UBShihWZZDA8=
CcrOdQtKpUrKSJqzig==
T/WOykxDMIU8/Q0=
XBwiL8gHqMd9JUiiX3+9
kpC3/164HctgequkvgoZQw==
enHp66c8IjQ=
aQYGrJLj3msLO5VP2WJqjW7+rhRdhA==
vDXNC+Q7VTNCCxI=
xWh0G6/2cIFB5ufaqTkHqGRN7zt5
jFLwNR5qOoU8/Q0=
IRa5/8L8vs2xLYKx
L5oor6OvWINoLTpfXvf98h9g+Q==
01FVerpZiCu82g==
IshjpT6he6Y9
UNuJ2awhgexLBRA=
kQD/IkhTZoRsfRyDAyg=
wIQ4Yy91Q3xYCDiWvgoZQw==
xJbODWKuFKgLsaGvvgoZQw==
CooPm7PhhIylxy3RGrmDFds77ARo
xHau8nb55cDT1cKz
rWTumLcgL1BSeRyDAyg=
ejPpClNWuQScxw==
oEH5T+cGGqjrNmkVmrI/bi8=
EJKwS83Y4nfe9CuKRmSu
DM2GjMuIuQScxw==
iAWaJTWEiB9Z4RyDAyg=
CtYQsdIzKoU8/Q0=
zpzF/GbBgje3aOfNlw==
F8xug9XSzeDT5pD3RF6q
FqukyevwFLkOyxyDAyg=
QjLUF95BcpCpiK24gA==
vnUTT+0UgexLBRA=
31brkKCS+H4VeZ+7
RQez61BOWa1I+Ac=
OS7mmaK7bIe4j5cqaxQJ8h9g+Q==
rlbMZ37Mq7WXSYSv/iI=
hzTCZITPnqu68El/e4XNnoPr0RJx
hVAJKOpaZsFdDxQ=
O0b/K5Upgg==
jhMiu0550a6bqAu+NYfdtSc=
e8pri9rk9lNKKYkHZe4N8h9g+Q==
7LVrhEajdHxxfRyDAyg=
52hl5Fpec9eCkvqdAiA=
cp12326.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation nqyjqo.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4816 set thread context of 4416 4816 nqyjqo.exe 83 PID 4416 set thread context of 3456 4416 nqyjqo.exe 56 PID 4156 set thread context of 3456 4156 ipconfig.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqyjqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4156 ipconfig.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4816 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4416 nqyjqo.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe 4156 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4416 nqyjqo.exe Token: SeDebugPrivilege 4156 ipconfig.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4416 4816 nqyjqo.exe 83 PID 4816 wrote to memory of 4416 4816 nqyjqo.exe 83 PID 4816 wrote to memory of 4416 4816 nqyjqo.exe 83 PID 4816 wrote to memory of 4416 4816 nqyjqo.exe 83 PID 3456 wrote to memory of 4156 3456 Explorer.EXE 84 PID 3456 wrote to memory of 4156 3456 Explorer.EXE 84 PID 3456 wrote to memory of 4156 3456 Explorer.EXE 84 PID 4156 wrote to memory of 3648 4156 ipconfig.exe 101 PID 4156 wrote to memory of 3648 4156 ipconfig.exe 101 PID 4156 wrote to memory of 3648 4156 ipconfig.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"C:\Users\Admin\AppData\Local\Temp\nqyjqo.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3648
-
-