Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 13:21
Static task
static1
Behavioral task
behavioral1
Sample
New RFQ 6000333264 (K0060-01).exe
Resource
win7-20241023-en
General
-
Target
New RFQ 6000333264 (K0060-01).exe
-
Size
1.0MB
-
MD5
01202dc54836c255eb5d901d3641e786
-
SHA1
60fdbb2aab5637e9b205a95c2940be264e07ca9f
-
SHA256
6262299f2c4308cc3f69f8e038d68cefb86f7acb0b718d1fe9416244c80b5956
-
SHA512
a95209c85deb8f971883ceea25c2cba9d06bb9d0a0d3141383ff7ef42ad767cc75beb366d5806d0cff62fe63a5079e4e9bfb68f58334ec5cee2de89c6c867b0c
-
SSDEEP
24576:TPxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussC5YTy3b:hYTqEpxnhjiTFdj
Malware Config
Extracted
formbook
ji99
f5hfqPfk5Co4t9g=
A9ql+89lMaIqvdw=
AuXIIWRbGyo4t9g=
UX9Pn/rz8So4t9g=
haAzYKqrYA==
hFdOOodp41DpKN3KlPmz
RA7UPC/1Nn7DtG2nMDC7qzFIqyNH5Q==
nu+6ldzdZuY7Mfy7R1u8
CUY9ntOFDwT+x5cuu7MwUpEX3jX7ycxrTA==
mBzgqeKiuSTnno+ywbU=
EY1SJn9aa2PgEaK8MCv87C1EqA==
eQ63l+wp6FNhJw==
1qqcmBMMW4cTvd71KFxawvWn
CU0a9s95/UP8lFS7yLc=
XnREpeCto+QncjZhqb8=
1GJM69VrRm+DuOdYWJo+Ug==
R6iIYTHZbuA0L+XKlPmz
oamYII2fY5HT3p28AlVawvWn
/f7UheK0ifs3
TSEN9Dv+PmX4hNnx
WvLVs/3i6FznDMg=
4bmWXuR4w/su
MNKdX5RTIGiXMA==
3O67B0gb9yT/8gWCCGVawvWn
AbmD3yIrA0APuxKPU3YSpJo=
zt6bb6WqNTFA+cPv
BhcCb2/rMP9A+cPv
x0oV3B0jffA3cyVBlrY=
IW0iIX5r6+XBqVqdFakIzxVCqA==
sJp7CmlX6FNhJw==
AQDIMKWnc7Go/7PWMqYZw/Sl
RfjEHl8sdm3ILw==
3+CGPSS0ifs3
pFAoBUD+OIECv+qTYw==
cnxz38ORB8L+09Y=
9q6JF/aXntocU+P2
4rxibbKOy0M+NPPQy8XRVWwVtw==
EoR1Uh+fjuFcDbbl
wiQCFnVerd5mM1DYVli7
21MS3hfVIWImCpu+aQ==
SY1VLx/zvkMJmlS7yLc=
soF6ceneVmI9LuXKlPmz
b9KFWZNZrONkoxaNFTuSWA==
O/7dqvm0ifs3
sZxx0xoU7SAj6o8XEGQ9degZXzU=
Zta7mWIFUZKRWF1ugo96GGZT/j0=
Lv7KFuGJywmb1J67vu6zeoM=
d2QNqKFspSQbFBmqdg==
/UpEqf3PHU0hAJeRzgrHiTfeqg==
BCACZ8rhGVwmCpu+aQ==
QkT8TqWKgLzLSA+reA==
jI5eemPElQmBPw==
Gw7iWZ9lHVdvG7E8/SZP5hM1vEDmv/s=
MIVMG0EjmpuVXwiSD483UA==
xefsRxa7x70HFmzDRlq7
lCQNoYY5RaJu6/nxzfs3wTvDoA==
oYwH5bgot+gq
BOK9GueR1hWY1X2A0fOaXJyUWGko
4MqeIHtZKnU5tsrO4kd7GGZT/j0=
H+bInfjwefh0evidZw==
AF4/I/SjY6l08Y8OAE71m5o=
NmFIrejCibC7gD7x/2GQLG4yyCQ=
+kgF5Mpjr94nF8Pycl4GyeOw
gW9P7Y788XLJhcE=
laventuredesam.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation New RFQ 6000333264 (K0060-01).exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1516 set thread context of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 1908 set thread context of 3488 1908 New RFQ 6000333264 (K0060-01).exe 56 PID 440 set thread context of 3488 440 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New RFQ 6000333264 (K0060-01).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe 440 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 1908 New RFQ 6000333264 (K0060-01).exe 440 msiexec.exe 440 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 New RFQ 6000333264 (K0060-01).exe Token: SeDebugPrivilege 440 msiexec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 1516 wrote to memory of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 1516 wrote to memory of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 1516 wrote to memory of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 1516 wrote to memory of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 1516 wrote to memory of 1908 1516 New RFQ 6000333264 (K0060-01).exe 93 PID 3488 wrote to memory of 440 3488 Explorer.EXE 94 PID 3488 wrote to memory of 440 3488 Explorer.EXE 94 PID 3488 wrote to memory of 440 3488 Explorer.EXE 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"C:\Users\Admin\AppData\Local\Temp\New RFQ 6000333264 (K0060-01).exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:440
-