Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
QUALITY SCALES CONTROL PO , PDF.exe
Resource
win7-20240729-en
General
-
Target
QUALITY SCALES CONTROL PO , PDF.exe
-
Size
512KB
-
MD5
599a2f1f7ae79d79e8811886a74db3a0
-
SHA1
c22dfc6ef39b158b403e9e2fa035847af9f6d524
-
SHA256
e1bd2c6c40bb7f29fc0f7d164f0d8061ec4cd33edac6db75c0810b10b19aeb3e
-
SHA512
3e580af9d144d36d850062ac466cf0930905708a032f865389d22ee672fba8d459d022255c6b8dcae3b75bd83fd739524b004c2144436c16c11c949511804abf
-
SSDEEP
12288:A6onlduxjoHbCaFLq/l4WCJHMBJvGdhL:6nruxseOWCJsLv
Malware Config
Extracted
formbook
4.1
ewws
gesundheitscoaching.one
leonspropertysolutions.com
urbancoderz.com
abybo.com
crybabysmensclub.com
russiaentertainment.com
lfgprima.com
snatchtime.net
cnrollershoes.com
gdddpc.com
psychicpatrol.com
minnienucup.com
thankscred.com
huellanaranja.com
office365microsoft.com
nisithailand.com
jumlasx.xyz
edm191.com
cleaoshop.com
najjarnabil.com
cartherm24.com
signuptrendingnature.com
watkismedia.com
brandariz.net
uforiawellness.com
myvirtualtution.com
omgomt.com
bajajsfinservlimited.com
xingmaitian.com
ampweddings.com
avalon78l.online
powerful-assets.com
saigongirlstx.com
ukdaffodils.com
ansiktbeskyttelse.online
pfzdj.com
heartandhilarity.com
granintraining.com
dropela.net
uflst.com
tr9427.com
myvipofficesupply.com
xchxds.com
khwaabh.com
codeless.pro
syntechlinks.com
videocliz.com
meltingvitamins.com
gorkhaaxn.com
kibugreen.com
pleasantdaysvintage.com
wth.network
haliboustudio.com
fuckscoot.club
santabirria.com
gresiaphysiotherapy.com
bitcoin20live20price20zones.com
easydesignz.com
ilnmdyqgl.icu
margueriteco.com
houstongeneratorservice.com
tiborkoller.com
tweak.pro
kometkasino.com
anayonbattery.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2868-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/2868-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4492-27-0x0000000000700000-0x000000000072E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation QUALITY SCALES CONTROL PO , PDF.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2732 set thread context of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 2868 set thread context of 3380 2868 QUALITY SCALES CONTROL PO , PDF.exe 56 PID 4492 set thread context of 3380 4492 wscript.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUALITY SCALES CONTROL PO , PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2732 QUALITY SCALES CONTROL PO , PDF.exe 2732 QUALITY SCALES CONTROL PO , PDF.exe 2732 QUALITY SCALES CONTROL PO , PDF.exe 2868 QUALITY SCALES CONTROL PO , PDF.exe 2868 QUALITY SCALES CONTROL PO , PDF.exe 2868 QUALITY SCALES CONTROL PO , PDF.exe 2868 QUALITY SCALES CONTROL PO , PDF.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe 4492 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2868 QUALITY SCALES CONTROL PO , PDF.exe 2868 QUALITY SCALES CONTROL PO , PDF.exe 2868 QUALITY SCALES CONTROL PO , PDF.exe 4492 wscript.exe 4492 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2732 QUALITY SCALES CONTROL PO , PDF.exe Token: SeDebugPrivilege 2868 QUALITY SCALES CONTROL PO , PDF.exe Token: SeDebugPrivilege 4492 wscript.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2732 wrote to memory of 4428 2732 QUALITY SCALES CONTROL PO , PDF.exe 100 PID 2732 wrote to memory of 4428 2732 QUALITY SCALES CONTROL PO , PDF.exe 100 PID 2732 wrote to memory of 4428 2732 QUALITY SCALES CONTROL PO , PDF.exe 100 PID 2732 wrote to memory of 4588 2732 QUALITY SCALES CONTROL PO , PDF.exe 102 PID 2732 wrote to memory of 4588 2732 QUALITY SCALES CONTROL PO , PDF.exe 102 PID 2732 wrote to memory of 4588 2732 QUALITY SCALES CONTROL PO , PDF.exe 102 PID 2732 wrote to memory of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 2732 wrote to memory of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 2732 wrote to memory of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 2732 wrote to memory of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 2732 wrote to memory of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 2732 wrote to memory of 2868 2732 QUALITY SCALES CONTROL PO , PDF.exe 103 PID 3380 wrote to memory of 4492 3380 Explorer.EXE 105 PID 3380 wrote to memory of 4492 3380 Explorer.EXE 105 PID 3380 wrote to memory of 4492 3380 Explorer.EXE 105 PID 4492 wrote to memory of 2952 4492 wscript.exe 106 PID 4492 wrote to memory of 2952 4492 wscript.exe 106 PID 4492 wrote to memory of 2952 4492 wscript.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RCidCypDzVJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2A04.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"3⤵PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3624
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUALITY SCALES CONTROL PO , PDF.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD592a81299240417fb2740b43d473dc939
SHA1ddd172b4ceed424e460afa10dd7279fe1536e5c4
SHA2564b9215a74120ed506ebd0dd8b2425413f7a41392b8c856924993a93e82930a42
SHA5125cbfcd3fc1a0a86b1e005a4860f65fde633bf1b3427123a2466aba9382f48a7fcf7a11244fb26627fb85db2c680ca2a3d1dccbe1fd9b42b0b159e876eeaeeb15