Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
New RFQ 6000333264 (K0060-01).exe
Resource
win7-20241023-en
General
-
Target
New RFQ 6000333264 (K0060-01).exe
-
Size
1.0MB
-
MD5
01202dc54836c255eb5d901d3641e786
-
SHA1
60fdbb2aab5637e9b205a95c2940be264e07ca9f
-
SHA256
6262299f2c4308cc3f69f8e038d68cefb86f7acb0b718d1fe9416244c80b5956
-
SHA512
a95209c85deb8f971883ceea25c2cba9d06bb9d0a0d3141383ff7ef42ad767cc75beb366d5806d0cff62fe63a5079e4e9bfb68f58334ec5cee2de89c6c867b0c
-
SSDEEP
24576:TPxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussC5YTy3b:hYTqEpxnhjiTFdj
Malware Config
Extracted
formbook
ji99
f5hfqPfk5Co4t9g=
A9ql+89lMaIqvdw=
AuXIIWRbGyo4t9g=
UX9Pn/rz8So4t9g=
haAzYKqrYA==
hFdOOodp41DpKN3KlPmz
RA7UPC/1Nn7DtG2nMDC7qzFIqyNH5Q==
nu+6ldzdZuY7Mfy7R1u8
CUY9ntOFDwT+x5cuu7MwUpEX3jX7ycxrTA==
mBzgqeKiuSTnno+ywbU=
EY1SJn9aa2PgEaK8MCv87C1EqA==
eQ63l+wp6FNhJw==
1qqcmBMMW4cTvd71KFxawvWn
CU0a9s95/UP8lFS7yLc=
XnREpeCto+QncjZhqb8=
1GJM69VrRm+DuOdYWJo+Ug==
R6iIYTHZbuA0L+XKlPmz
oamYII2fY5HT3p28AlVawvWn
/f7UheK0ifs3
TSEN9Dv+PmX4hNnx
WvLVs/3i6FznDMg=
4bmWXuR4w/su
MNKdX5RTIGiXMA==
3O67B0gb9yT/8gWCCGVawvWn
AbmD3yIrA0APuxKPU3YSpJo=
zt6bb6WqNTFA+cPv
BhcCb2/rMP9A+cPv
x0oV3B0jffA3cyVBlrY=
IW0iIX5r6+XBqVqdFakIzxVCqA==
sJp7CmlX6FNhJw==
AQDIMKWnc7Go/7PWMqYZw/Sl
RfjEHl8sdm3ILw==
3+CGPSS0ifs3
pFAoBUD+OIECv+qTYw==
cnxz38ORB8L+09Y=
9q6JF/aXntocU+P2
4rxibbKOy0M+NPPQy8XRVWwVtw==
EoR1Uh+fjuFcDbbl
wiQCFnVerd5mM1DYVli7
21MS3hfVIWImCpu+aQ==
SY1VLx/zvkMJmlS7yLc=
soF6ceneVmI9LuXKlPmz
b9KFWZNZrONkoxaNFTuSWA==
O/7dqvm0ifs3
sZxx0xoU7SAj6o8XEGQ9degZXzU=
Zta7mWIFUZKRWF1ugo96GGZT/j0=
Lv7KFuGJywmb1J67vu6zeoM=
d2QNqKFspSQbFBmqdg==
/UpEqf3PHU0hAJeRzgrHiTfeqg==
BCACZ8rhGVwmCpu+aQ==
QkT8TqWKgLzLSA+reA==
jI5eemPElQmBPw==
Gw7iWZ9lHVdvG7E8/SZP5hM1vEDmv/s=
MIVMG0EjmpuVXwiSD483UA==
xefsRxa7x70HFmzDRlq7
lCQNoYY5RaJu6/nxzfs3wTvDoA==
oYwH5bgot+gq
BOK9GueR1hWY1X2A0fOaXJyUWGko
4MqeIHtZKnU5tsrO4kd7GGZT/j0=
H+bInfjwefh0evidZw==
AF4/I/SjY6l08Y8OAE71m5o=
NmFIrejCibC7gD7x/2GQLG4yyCQ=
+kgF5Mpjr94nF8Pycl4GyeOw
gW9P7Y788XLJhcE=
laventuredesam.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\International\Geo\Nation New RFQ 6000333264 (K0060-01).exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2312 set thread context of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2652 set thread context of 1196 2652 New RFQ 6000333264 (K0060-01).exe 21 PID 2652 set thread context of 1196 2652 New RFQ 6000333264 (K0060-01).exe 21 PID 3040 set thread context of 1196 3040 ipconfig.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New RFQ 6000333264 (K0060-01).exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3040 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2312 New RFQ 6000333264 (K0060-01).exe 2312 New RFQ 6000333264 (K0060-01).exe 2312 New RFQ 6000333264 (K0060-01).exe 2312 New RFQ 6000333264 (K0060-01).exe 2312 New RFQ 6000333264 (K0060-01).exe 2312 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe 3040 ipconfig.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 2652 New RFQ 6000333264 (K0060-01).exe 3040 ipconfig.exe 3040 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2312 New RFQ 6000333264 (K0060-01).exe Token: SeDebugPrivilege 2652 New RFQ 6000333264 (K0060-01).exe Token: SeDebugPrivilege 3040 ipconfig.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2692 2312 New RFQ 6000333264 (K0060-01).exe 31 PID 2312 wrote to memory of 2692 2312 New RFQ 6000333264 (K0060-01).exe 31 PID 2312 wrote to memory of 2692 2312 New RFQ 6000333264 (K0060-01).exe 31 PID 2312 wrote to memory of 2692 2312 New RFQ 6000333264 (K0060-01).exe 31 PID 2312 wrote to memory of 2636 2312 New RFQ 6000333264 (K0060-01).exe 32 PID 2312 wrote to memory of 2636 2312 New RFQ 6000333264 (K0060-01).exe 32 PID 2312 wrote to memory of 2636 2312 New RFQ 6000333264 (K0060-01).exe 32 PID 2312 wrote to memory of 2636 2312 New RFQ 6000333264 (K0060-01).exe 32 PID 2312 wrote to memory of 2632 2312 New RFQ 6000333264 (K0060-01).exe 33 PID 2312 wrote to memory of 2632 2312 New RFQ 6000333264 (K0060-01).exe 33 PID 2312 wrote to memory of 2632 2312 New RFQ 6000333264 (K0060-01).exe 33 PID 2312 wrote to memory of 2632 2312 New RFQ 6000333264 (K0060-01).exe 33 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 2312 wrote to memory of 2652 2312 New RFQ 6000333264 (K0060-01).exe 34 PID 1196 wrote to memory of 3040 1196 Explorer.EXE 35 PID 1196 wrote to memory of 3040 1196 Explorer.EXE 35 PID 1196 wrote to memory of 3040 1196 Explorer.EXE 35 PID 1196 wrote to memory of 3040 1196 Explorer.EXE 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"3⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"3⤵PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"3⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3040
-