Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wivczschg.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
wivczschg.exe
Resource
win10v2004-20241007-en
General
-
Target
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe
-
Size
238KB
-
MD5
102b3ebb841c1dffa5b08afcc39222dc
-
SHA1
758e0993c007af3949a60a0ffe1ec19c4e045ced
-
SHA256
f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25
-
SHA512
e1452b4ac7b453b6f899554b223596e7ce258986358e56b3f2dc69bafc2178b6c83894fe507dd9a5d4d0df687b584ae41ada6482b1e73d208e0cb59ca37ac446
-
SSDEEP
6144:TxDpLHyngojOTo5Y+pfy3jBabNIjhfFcauPkqSEaBx5KNWYi17lrsAo:jDSpyo5Y+pqVabW3ca+eKMtsAo
Malware Config
Extracted
formbook
4.1
b62r
gaykolkata.com
idfinancing.com
hoangphucpharmacy.com
lotworksvariouss.biz
abanchiq.com
galaxylike.com
lyhfyp.com
phantomux.com
lobotours.net
dapcol.online
airplay90.com
hylserviciosintegrales.com
lvmvdp.xyz
economybooiings.com
epiteks.com
soprendenteshop.com
mangaclsh.com
mywebprofile.xyz
fabianwilliamart.com
ayabadge.com
baratti-paris12.com
12xlwin3a.net
threemy3.com
longmontpubliclibrary.net
overviewnews.com
gogofranceacademy.com
wallstreetventurecapital.net
aphicide00eau.com
servicrear.com
approvedpillpack.com
raiseprogrammes.com
mlcc12.com
loftycoinexchange.com
back-money.com
9186777.com
reinvesting.pro
multiplebubbles.com
askmorgan.co
witst.com
gfrmth.com
drdentalmx.com
abanchiq.com
wallstreetdust.com
pitbosgrills.com
topcruisetrips.com
hqbwf.xyz
kurost.com
krewedup.com
plumasdelgolfo.com
txt-txt.biz
hugepay8.com
investimentsecrets.com
posicionamientocurso.com
accordbuilding.com
paris-spirits.com
cogenttfinance.com
agelessschool.com
viabenefitz.com
fevereiroconosfaaaat.com
anogueiraassessoria.com
yndjgc.com
ialphawebpro.com
fururehome.com
funerariamanabi.com
theburpinggoblin.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2256-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2256-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2256-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2736-25-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
pid Process 2708 wivczschg.exe 2256 wivczschg.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 2708 wivczschg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2708 set thread context of 2256 2708 wivczschg.exe 32 PID 2256 set thread context of 1208 2256 wivczschg.exe 21 PID 2256 set thread context of 1208 2256 wivczschg.exe 21 PID 2736 set thread context of 1208 2736 raserver.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wivczschg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2256 wivczschg.exe 2256 wivczschg.exe 2256 wivczschg.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe 2736 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2256 wivczschg.exe 2256 wivczschg.exe 2256 wivczschg.exe 2256 wivczschg.exe 2736 raserver.exe 2736 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2256 wivczschg.exe Token: SeDebugPrivilege 2736 raserver.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2708 3048 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 30 PID 3048 wrote to memory of 2708 3048 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 30 PID 3048 wrote to memory of 2708 3048 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 30 PID 3048 wrote to memory of 2708 3048 f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe 30 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 2708 wrote to memory of 2256 2708 wivczschg.exe 32 PID 1208 wrote to memory of 2736 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2736 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2736 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2736 1208 Explorer.EXE 33 PID 2736 wrote to memory of 3060 2736 raserver.exe 35 PID 2736 wrote to memory of 3060 2736 raserver.exe 35 PID 2736 wrote to memory of 3060 2736 raserver.exe 35 PID 2736 wrote to memory of 3060 2736 raserver.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe"C:\Users\Admin\AppData\Local\Temp\f79d4a4a519f6ddaf119529ca2392d7b7721901b9761264d0d2ff1410dda9e25.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\wivczschg.exeC:\Users\Admin\AppData\Local\Temp\wivczschg.exe C:\Users\Admin\AppData\Local\Temp\bqbubiphod3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\wivczschg.exeC:\Users\Admin\AppData\Local\Temp\wivczschg.exe C:\Users\Admin\AppData\Local\Temp\bqbubiphod4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\wivczschg.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5b12547b07cd7190d39483d6edc98a6a2
SHA188597120504ec40dfd469792846cc170113db9e1
SHA256328bc274527798a2b7dfcfac1a4d23a650d8c144b11fd460bd57b3828aeab4cb
SHA5126ca6a1a15b7cc1f8e32a3d2ca23cc2d4df991e96feaa8ee10ecd5ba3c021842607cb85750585a146b9eca4dd54c4cebffd003bd552a982cd3c68622d7d6286f7
-
Filesize
4KB
MD5891d27523f3e020b2a4a438c2ae80ccb
SHA1df17db0cb95b25d5f3106d9704f7138bcb6dea58
SHA2568344dc093d4b4d194df178d6b88fe5266bb95fbb5626f0c191edcf8dad662279
SHA51273732185648d17558eb9e8c48742cf1d829aa99be74253014c2b00c855e3e1551d3e959c9fa29e3cabfc30d4c8cc5e0ec7471d2ef976a05f624b8754779bb399
-
Filesize
6KB
MD5aff04f5ef16ed23b7c7b3a15e5ea644a
SHA1ca4639d4d6c7294c03816943c0a29f4bccf943c3
SHA256cf56b1b6dde6ae7800d3d1af04c154a5c5c635422cb2417cfc8f29ee665c1359
SHA5121954c3e6d5ef261effd9de98d862ed429a1bbe7fc8d9c9b18c43c3da4132991a31006ade1a2c06c5c2449782223cb26d52173c9ac18d849ec26f7d458210773a