Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
Quote NoRYU15674.exe
Resource
win7-20240903-en
General
-
Target
Quote NoRYU15674.exe
-
Size
534KB
-
MD5
4f75b9d6f4765318096199de4cc501a6
-
SHA1
ca57a26c665ec2b566fbd0c103cf44f6e0102810
-
SHA256
3295195cc0beb345e8af43273cbedbfcc631c4498f7a91bb1dfa82bfd1cda67b
-
SHA512
7596620eba746ebf0784970c80cf5c3ef563acb70dd0dd8a5762c0690e27eb84e311216924d82de8d28c47d3faec67a2507cb75a217364715fb25d37b7c6eecc
-
SSDEEP
12288:GAsiJr6HjcETqvMrrSYuQY413gIaENyztD00sxxi0/js:DFlgXTgMKI9Q0NaC0
Malware Config
Extracted
formbook
4.1
b26m
zmdjsbe.com
fredandbettysdogtreats.com
naaacyjl.xyz
chestermclean.net
hbxemu.com
daniandlaila.com
liantongquan.com
clubdjportugal.online
ambcu.com
clinkssamui4.xyz
oebfcdtwwkdpspq.com
swnlmu.com
asctechagent.com
melhorearotina.online
infohouseti.com
busstoppanicbutton.com
cheyennewindenergy.com
partlee.com
855408.com
beyourownbossbyob.com
psoriaticarthritisoffers.com
infinityartistry.net
metainstagram.film
toyaaita.xyz
amthuchomnay.net
lonestarribhousebunbury.com
tcachallenge.com
txlvfeng.com
patriotscornerproducts.com
t4p1221.com
deluxnshopping.com
lindblick.xyz
cfnfrto.xyz
k9win.online
danielrabbit.com
fulfilmenteasy.com
danzatandava.online
randallinspection.com
pchubenterprises.com
thehangerr.com
nahlajr.com
thdns-flex.site
jkeltgr.xyz
commongodapparel.com
wavyseal.com
bdcadvocates.com
furniturizm.com
744286.com
ahmetgunes.net
wutyakf.xyz
totallybread.com
debug-dev.com
best-help-debtrelief.website
213150.com
gcbbtn.xyz
careersatmeta.com
bchatbox.net
southwestsafariadventures.com
piaudit.com
qilipingtai.com
bniescuadron.com
vaance-platform.com
lujoespana.xyz
kenal.online
kuthethao.win
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2804-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2804-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2332-22-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2244 set thread context of 2804 2244 Quote NoRYU15674.exe 31 PID 2804 set thread context of 1236 2804 Quote NoRYU15674.exe 21 PID 2332 set thread context of 1236 2332 raserver.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote NoRYU15674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2804 Quote NoRYU15674.exe 2804 Quote NoRYU15674.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe 2332 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2804 Quote NoRYU15674.exe 2804 Quote NoRYU15674.exe 2804 Quote NoRYU15674.exe 2332 raserver.exe 2332 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2804 Quote NoRYU15674.exe Token: SeDebugPrivilege 2332 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 2244 wrote to memory of 2804 2244 Quote NoRYU15674.exe 31 PID 1236 wrote to memory of 2332 1236 Explorer.EXE 32 PID 1236 wrote to memory of 2332 1236 Explorer.EXE 32 PID 1236 wrote to memory of 2332 1236 Explorer.EXE 32 PID 1236 wrote to memory of 2332 1236 Explorer.EXE 32 PID 2332 wrote to memory of 2712 2332 raserver.exe 33 PID 2332 wrote to memory of 2712 2332 raserver.exe 33 PID 2332 wrote to memory of 2712 2332 raserver.exe 33 PID 2332 wrote to memory of 2712 2332 raserver.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2712
-
-