Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
Copia de transferencia bancaria.exe
Resource
win7-20240729-en
General
-
Target
Copia de transferencia bancaria.exe
-
Size
971KB
-
MD5
8ee464229bdaac78e1354a7ff334af85
-
SHA1
a566511090198f92b82e07c1675b256f6c91e923
-
SHA256
8095979c4153bbcced38a6ee12589fbb67f356535a91cf22e26413ee3f1c4e34
-
SHA512
836274df2b83188718400c22b71becbf445d2f128cdfbc342cb62cb3655cc70441a638705911c449f500748e7be13082a11ac4d261a03e9c805cdf10e3e1ab87
-
SSDEEP
12288:Ntcg0r9tDZddpnLnv2hVSKRytHxnrceHMcrIaPy1FTAUI4kSxv1/:Nt893hSh0K0pxVIaPy1FW41
Malware Config
Extracted
formbook
4.1
de19
predictivemedicine.life
coloringforthepeople.com
project154.com
usmmexchange.com
bootzxon.com
chaoge730.com
thenaci.com
moviestarplent.com
musicallyengaged.com
sneakerspark.net
yudist.com
apqrcx.xyz
traceless.tel
guardlanavionics.com
usadogrights.com
openei.club
aventusluxury.com
telewebin.com
godrej-threeparks.net
solbysol.com
tarahomesolutions.com
riaairlines.com
berrygooddesigns.com
assistance-bouygues-telecom.com
s4hbgroupds.com
lago-vista-ata-martial-arts.com
icishopping.com
itkonsult.online
knightsbridgecdd.com
wrightstowntigers.com
gzxsb.com
teenanxiety.co
shanepisko.com
fftblogs.com
br-cleaning.plus
miami1688.cool
necomw.com
americanfreightsystemsinc.com
veirdmusic.com
brandnicer.com
ones77motiving.com
stephensthebakers.com
thaicomfortfood.com
mooreandsonsak.net
19838888.com
hay-yusspd-osaka-japan.life
junaidsubhani.tech
cadengineer.co.uk
camaratechsevilla.com
scholarsinfoguide.com
listcord.net
bossyoushu.com
robertkslaughter.xyz
locallywhitstable.co.uk
rsbtileinc.com
eviexo.com
lung-cancer-treatment-43816.com
lizandpeter.com
iberiahomes.institute
buyeber.net
hanarsedivy.com
fielsp.online
kuav7.com
1classlawncare.com
lanyuelou.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2072-31-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2072-41-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3508-78-0x00000000005B0000-0x00000000005DF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1372 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Copia de transferencia bancaria.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4000 set thread context of 2072 4000 Copia de transferencia bancaria.exe 95 PID 2072 set thread context of 3520 2072 RegSvcs.exe 56 PID 3508 set thread context of 3520 3508 chkdsk.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Copia de transferencia bancaria.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1372 powershell.exe 2072 RegSvcs.exe 2072 RegSvcs.exe 2072 RegSvcs.exe 2072 RegSvcs.exe 1372 powershell.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe 3508 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2072 RegSvcs.exe 2072 RegSvcs.exe 2072 RegSvcs.exe 3508 chkdsk.exe 3508 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 2072 RegSvcs.exe Token: SeDebugPrivilege 3508 chkdsk.exe Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1372 4000 Copia de transferencia bancaria.exe 91 PID 4000 wrote to memory of 1372 4000 Copia de transferencia bancaria.exe 91 PID 4000 wrote to memory of 1372 4000 Copia de transferencia bancaria.exe 91 PID 4000 wrote to memory of 3996 4000 Copia de transferencia bancaria.exe 93 PID 4000 wrote to memory of 3996 4000 Copia de transferencia bancaria.exe 93 PID 4000 wrote to memory of 3996 4000 Copia de transferencia bancaria.exe 93 PID 4000 wrote to memory of 2072 4000 Copia de transferencia bancaria.exe 95 PID 4000 wrote to memory of 2072 4000 Copia de transferencia bancaria.exe 95 PID 4000 wrote to memory of 2072 4000 Copia de transferencia bancaria.exe 95 PID 4000 wrote to memory of 2072 4000 Copia de transferencia bancaria.exe 95 PID 4000 wrote to memory of 2072 4000 Copia de transferencia bancaria.exe 95 PID 4000 wrote to memory of 2072 4000 Copia de transferencia bancaria.exe 95 PID 3520 wrote to memory of 3508 3520 Explorer.EXE 96 PID 3520 wrote to memory of 3508 3520 Explorer.EXE 96 PID 3520 wrote to memory of 3508 3520 Explorer.EXE 96 PID 3508 wrote to memory of 4288 3508 chkdsk.exe 97 PID 3508 wrote to memory of 4288 3508 chkdsk.exe 97 PID 3508 wrote to memory of 4288 3508 chkdsk.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Copia de transferencia bancaria.exe"C:\Users\Admin\AppData\Local\Temp\Copia de transferencia bancaria.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\inKcSqSKZsI.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\inKcSqSKZsI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2E4E.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD561fd853d7ec0636f149a48080163aab5
SHA11b112991e939c33f0104a3f78f1c2bc399536c4a
SHA256dee1322cf7c216ef27803ea6d48b02510d85720f032196dbe064744e52fe5313
SHA512f046b0fdb64ff68c5b84c1e8946c84348879ffe1d2fc6326245ab684493006dd8b56d49c74b78daa568865c730f23759bb3248b3a2e0bccf2e6292a51899c05e