Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
textttr4809.exe
Resource
win7-20240708-en
General
-
Target
textttr4809.exe
-
Size
1.2MB
-
MD5
6a85b6fadb20c016b98e8ba0fcdfcc44
-
SHA1
c5c423ccfd6539ba04f56221bbb79c83baa93be4
-
SHA256
b4855381993299ec39524043aa7f8898a4fe64524ab943bc1db297f62c181824
-
SHA512
3e5827593da1dd78df4776ddc35f519791ea45ffa6d6d371b6b531ca4b0a030b2d8c296e093488beda886ad652e281c32f7aa830d57523730287c53621327e5a
-
SSDEEP
24576:0AOcZ2i7uyaiDbX1Z0JsyNVaCpaQj5HUSIOg0+MkYGEy:igDbX1asyiCcw5HPnS
Malware Config
Extracted
formbook
4.1
t01w
yeluzishiyanshi.com
thehardtech.xyz
arrowheadk8.site
zaulkunutila.xyz
lookastro.net
congregorecruitment.co.uk
darcyboo.uk
collettesbet.net
ltgpd.com
hiddenapphq.net
haxtrl.online
esenbook.com
jxzyyx.com
ulvabuyout.xyz
instashop.life
vazra.top
ewdvatcuce4.top
zhishi68.com
fabricsandfashion.com
hootcaster.com
chadwelchart.com
zamoracollection.com
eoliq.com
fbo.app
551by.com
cbbtraffic.site
prepasigma.com
cinq.design
maxsonrealty.com
xzxzk.com
mein-digitales-testament.online
beachloungespa.com
atninja.xyz
secure-internetbanking-help.com
beautyinfluencers.club
kcssteakandribsohio.com
local-dress.store
zhuilang.net
youngdongent.com
bobijnvidit.xyz
buyicx.com
zipular.com
unverify.us
tudoristan.com
texasonmission.com
premintbot.xyz
tricon.info
dinazorpizza.com
minhlam.store
sustainabledentists.com
cocolmanual.xyz
illegalz.agency
homecrowds.net
polyfake.com
omgsweepsship.com
asteliaceramika.com
retro235.space
35kclub.com
lemex.co.uk
bebigshop.com
customrenovatl.com
palccoyotour.com
adanarinoplasti.xyz
calnovi.com
techreshendo.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/364-59-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/364-61-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/656-63-0x00000000003D0000-0x00000000003FF000-memory.dmp formbook -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation textttr4809.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 3532 eqxppmhfrn.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3532 set thread context of 364 3532 eqxppmhfrn.exe 86 PID 364 set thread context of 3540 364 RegSvcs.exe 56 PID 364 set thread context of 3540 364 RegSvcs.exe 56 PID 656 set thread context of 3540 656 wscript.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language textttr4809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqxppmhfrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings textttr4809.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 364 RegSvcs.exe 364 RegSvcs.exe 364 RegSvcs.exe 364 RegSvcs.exe 364 RegSvcs.exe 364 RegSvcs.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe 656 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 364 RegSvcs.exe 364 RegSvcs.exe 364 RegSvcs.exe 364 RegSvcs.exe 656 wscript.exe 656 wscript.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 364 RegSvcs.exe Token: SeShutdownPrivilege 3540 Explorer.EXE Token: SeCreatePagefilePrivilege 3540 Explorer.EXE Token: SeShutdownPrivilege 3540 Explorer.EXE Token: SeCreatePagefilePrivilege 3540 Explorer.EXE Token: SeDebugPrivilege 656 wscript.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 920 wrote to memory of 4580 920 textttr4809.exe 83 PID 920 wrote to memory of 4580 920 textttr4809.exe 83 PID 920 wrote to memory of 4580 920 textttr4809.exe 83 PID 4580 wrote to memory of 3532 4580 WScript.exe 84 PID 4580 wrote to memory of 3532 4580 WScript.exe 84 PID 4580 wrote to memory of 3532 4580 WScript.exe 84 PID 3532 wrote to memory of 2436 3532 eqxppmhfrn.exe 85 PID 3532 wrote to memory of 2436 3532 eqxppmhfrn.exe 85 PID 3532 wrote to memory of 2436 3532 eqxppmhfrn.exe 85 PID 3532 wrote to memory of 364 3532 eqxppmhfrn.exe 86 PID 3532 wrote to memory of 364 3532 eqxppmhfrn.exe 86 PID 3532 wrote to memory of 364 3532 eqxppmhfrn.exe 86 PID 3532 wrote to memory of 364 3532 eqxppmhfrn.exe 86 PID 3532 wrote to memory of 364 3532 eqxppmhfrn.exe 86 PID 3532 wrote to memory of 364 3532 eqxppmhfrn.exe 86 PID 3540 wrote to memory of 656 3540 Explorer.EXE 93 PID 3540 wrote to memory of 656 3540 Explorer.EXE 93 PID 3540 wrote to memory of 656 3540 Explorer.EXE 93 PID 656 wrote to memory of 644 656 wscript.exe 96 PID 656 wrote to memory of 644 656 wscript.exe 96 PID 656 wrote to memory of 644 656 wscript.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\textttr4809.exe"C:\Users\Admin\AppData\Local\Temp\textttr4809.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\6_45\fmgnrws.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\6_45\eqxppmhfrn.exe"C:\Users\Admin\AppData\Local\Temp\6_45\eqxppmhfrn.exe" rpvqetvcc.rsk4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵PID:2436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b5b4f7b97106aff4bd860cff0e13dcdc
SHA142ca977e0d14bde5d5831b7fe10f516186df3fc5
SHA2561dbad30b09c655ff987f25c312f56e9695d60105c240686d05d33941c854fa73
SHA5123e6742aea38c0cbfee8e5cb8f11d328c947c7e4fcca4604b498a7e254aacfe53cc8fc6171d5ed2db7755abb510c09036bfbb1e5a9d9b7b47a587b43c828e3185
-
Filesize
370KB
MD57883104f51596624976b564ab1a3a5c7
SHA11ebf56538a1d8fe0ed13f1e074ba465faba1ef5f
SHA256d7a503112b68914903fd208884e795e98098bb4685f60dec200657e74e5b08a9
SHA5127aacb5c5f9825f7c3b0bd8ccb8934efb4ecbc6743c479a739b41ba353f54c903a4e881a9ecec3097cc4c76c26c24664ce4fd1f216d6185515086aa9aed103f63
-
Filesize
41KB
MD54fac2ebfd126cf6f3366cff8d58bf824
SHA1bcb12134483fbc145a289264a0d8da377009c83b
SHA25658a41f014c688847cd1c00cf3bc7300192c68836959276a19e6d619f27bc8ed7
SHA5124a0b26c48d326b220030ffffec69f16caa4bad33a7c597f4e7b1e6c3c55b77fb3d74fc2c3a867f8267de67c09d7ac7070be7eb8e2fe42285d7a0481f1743ff0e
-
Filesize
32KB
MD51cad0d875a47ce40af10e4bcd8610ac3
SHA11c7c64399eecb7947b66105f2b0c70e8f962460f
SHA256131267eba948a969bb7464035b59f226eca0c17193ec2d491717647dcc1db118
SHA512a4fb08788fc5c7b450e8ff861f24d4a7d60f730a1188b809b07e8e7e17f3c478b70f4f10f92ad7dde467fe31a0b640a7cc4ecbcd24d10925bc8f2fa3ece2abe4