Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe
Resource
win7-20240903-en
General
-
Target
27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe
-
Size
869KB
-
MD5
3e71d2e715046c0f2e8241cdccbefe4b
-
SHA1
754f41de14a8e2e03a0df5d16d7c54c85dad1bf2
-
SHA256
27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f
-
SHA512
f4158e6b9d4265bbdb6f9522f947927c93c9bb25ea0f517dbc8a8f0c7c94d9224a1e7e8e996b9ceef7aee9e869c5a7a7512f665313e0bedc2c8ec369531003ee
-
SSDEEP
12288:5eYYBqpmHXjNQWzqQ+Prrq5SdIBuIz++T46XQo0/T1jct2NjFWOHeF:5HYBTakbC/q5ScuIzdM6kjcMNjP
Malware Config
Extracted
formbook
4.1
odse
braedlifestyle.com
morganjohnsondesign.online
surup-v48.club
diypoolpaint.sydney
v-b7026-ghhh.space
vetyvar.com
lollydaisy.com
campsitesurvival.com
autocalibre.com
fusiontech3d.com
xn--udkog0cvez259c82sa.xyz
eccentricartist.com
jc-zg.com
wacwin.com
livehealthychoice.com
visijuara.com
phigsa.com
sabayawork.com
afcerd.com
joeyshousesessions.com
fancycn.com
fem-iam.com
sinopocasles.com
skypalaceportal.com
wqajecjeias.com
selfscienceslabs.com
workingtitle.agency
asianartsawards.com
healtyhouse.com
iloveme.life
espacioleiva.com
dac71047.com
soldbygenajohnson.com
motherhenscoop.com
polkadotcoins.com
muslimmediation.com
grub-groove.com
albertaeatsfood.com
mixedplaylists.com
miamimotorcycleshop.com
unegublog.com
generalssoccer.com
manhattanlandscapedesign.com
cuongnguyen3r2j.com
stonelodgeseniorliving.com
swissinternationaltrustb.com
novemento.club
bladesmts.com
espiaruncelular.net
talasoglufinans.com
sargeworld.com
newlifenowblog.com
sugaringpalms.com
xaoikevesesede.com
mintyline.com
paleonade.com
saharsaghi.com
kentchimney.com
whipitgudd.com
gmopst.com
likekopi.com
spoonproductions-catering.com
annotake.com
stm32heaven.com
guncelekspres.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4896-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4896-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4896-26-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4048 set thread context of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 4896 set thread context of 3484 4896 RegSvcs.exe 56 PID 4896 set thread context of 3484 4896 RegSvcs.exe 56 PID 3024 set thread context of 3484 3024 colorcpl.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe 3024 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4896 RegSvcs.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 4896 RegSvcs.exe 3024 colorcpl.exe 3024 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe Token: SeDebugPrivilege 4896 RegSvcs.exe Token: SeDebugPrivilege 3024 colorcpl.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1688 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 91 PID 4048 wrote to memory of 1688 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 91 PID 4048 wrote to memory of 1688 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 91 PID 4048 wrote to memory of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 4048 wrote to memory of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 4048 wrote to memory of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 4048 wrote to memory of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 4048 wrote to memory of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 4048 wrote to memory of 4896 4048 27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe 93 PID 3484 wrote to memory of 3024 3484 Explorer.EXE 94 PID 3484 wrote to memory of 3024 3484 Explorer.EXE 94 PID 3484 wrote to memory of 3024 3484 Explorer.EXE 94 PID 3024 wrote to memory of 2824 3024 colorcpl.exe 95 PID 3024 wrote to memory of 2824 3024 colorcpl.exe 95 PID 3024 wrote to memory of 2824 3024 colorcpl.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe"C:\Users\Admin\AppData\Local\Temp\27db806a5b1919f930f40810624889f20bcafaa485c89d4ca522fe6335dfea1f.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WjWgdwObUx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp17E8.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54697cfdc88af2f2a05894c1e6e8d502a
SHA192b76f7572d2b2ddab5e2d0b40c93e4f27a80a03
SHA256133fc82e2762f13a12d319954b1f2ac91b36aa80898725cc1cd6b8be9728a248
SHA512e32c92a26a655effee9e0e93f791d8a2404c2cf60ca207f52fd70ad10d8621f30009ff948194b1d07328c73dea0ae1c7e64d88f5c0072a16198b4ac8fa3f3718