Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe
Resource
win7-20240903-en
General
-
Target
a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe
-
Size
1.2MB
-
MD5
8f6f8bc43de5fbdddedb774a22e3dca1
-
SHA1
3f48029084649e39963710b0ae114b4663d48e68
-
SHA256
a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f
-
SHA512
ff48e557c37a8ebda2d9504727681dca35353003e87369e5462fb20a1c4746fb998200130b23518288a2bf7c4af06e8853937251af7b2c17e94a46d39b991797
-
SSDEEP
24576:7AOcZX4ctcwhwheT60L/2NgeSMj5HHeg/cbGOSMIEn:dPwhUwvfe/5HdYGOSMV
Malware Config
Extracted
formbook
ubpr
ptpVli2do9q89N0=
+CSLnNslIIErRTE3deUw4HXnuqwqG4+WpQ==
5IBw+rDmyajH6J9b0Gc0
ITivu/UzzGQKCQ==
qNw+VJ7Ni+WT3pA2e/8=
6VzmXNT+607aCN1UmHCt1CjO
a+xfszZjSqdZhCfX5fXnJkJFIsuN8Ns=
DLyp4MD0xUCL6olI
kysKo0J45suL6olI
oE/eN+zqkP2lyG6YYSalUA==
Rko77gUFcKTQFA==
cW14AsnTkUOf0N6ODWjpj7S6nRI=
M9yx/sTJbmx2vzUeWQ==
SQJdWnStlfaz6J0M04r3MN8=
FLhBiiYfyjfZFOdgHU1SfmVhAGgV
nKgaME1YHRs+cHTkn4oI3ibO
vuZIRIyKMaBGiUl9iaiZxNc=
UPnZdBQV1nzxKB1N
iARlleEZxTSL6olI
w5hz+KfftpWkwox0yH7vo0GrwW7RjWVk
kaAqSHu4ptq89N0=
O3CziqftBeLwA/njKyEj
vEA50pDJigF0lGYgHjpxEKcyYwptHg==
FMKdK8wNgWCCk2VoZEOzVg==
fRoOiiZaKdVAf3NrZEOzVg==
VV7kVQYSwS7URRkgBDOkoofG
FDCembDq2Ee/zcFv74GglorM
Ew4U5xiDinh6vzUeWQ==
oa0omDh482X4
GMJJhyAr8eT0BvwvPVR/FrM2YwptHg==
EbK9tuhdalRecoo644iIkj9DIsuN8Ns=
BSB/Wnq0phHM/9QdXe0m
5OreiLv1t7DXAJ3RQor3MN8=
1FLV4uTTfGJqnGjAQIr3MN8=
7wNnVm2qnfGAtmnjKyEj
XNIl9g0/IIo6fxFOkJSlQQ==
GqKXJqeNLItAf3NrZEOzVg==
XGjNyMwsEQQQN9ONj6l/mWRgLX9yNs9o
coiiIb821K/ZFg==
ksuTEwh482X4
StAxCChpaNd3xZSQKOI=
tMQmkECyqdq89N0=
g6cSUeTcl3qs9vfjKyEj
O2ZtSFV9QaxGhjn6HPJM5sg=
UHuKZ6aqS0NMao4Q04r3MN8=
+ZT0vdwV+Fv5fxrkTg==
V3LM/5aLNw4eJOPcNNbU9LfM+SADc9lu
8nxx8Ym7kGx6vzUeWQ==
RGC8z9vhxTLC0oQtQFukoofG
p+RabJvdzT3hD/V1KjpBaK82Q+5gFA==
XwrgMNhLwTSL6olI
2wFqerDrwyfL+JA2e/8=
X+hjpg42E4cWVTr0rKz1sdc=
MWbPFJXPtRem3ZA2e/8=
ehqd5mybcsVgcWljmz6rBcU6LA==
CYv3RsGEG4kGJfzGnx5JeLIyYwptHg==
rMoZJg7CvZugrmpgZEOzVg==
cCAL2ucb8pgASPgsXw==
zdzTL77u0XzxKB1N
1tgMUk5GBVng+JA2e/8=
HZwKXN4G8En3KOClsdbtEVvkIo5yNs9o
/v9Chjqlo9q89N0=
WvwFmBkDkvGKrBAQGhgh
5hiIh5S9nP2Jn41FkJSlQQ==
gopro-one.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe -
Executes dropped EXE 3 IoCs
pid Process 4120 fujab.exe 1492 RegSvcs.exe 4972 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4_19\\fujab.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\4_19\\dkkwd.mkd" fujab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4120 set thread context of 1492 4120 fujab.exe 87 PID 1492 set thread context of 3520 1492 RegSvcs.exe 56 PID 1492 set thread context of 3520 1492 RegSvcs.exe 56 PID 4564 set thread context of 3520 4564 cmmon32.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujab.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 1492 RegSvcs.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe 4564 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1492 RegSvcs.exe Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeDebugPrivilege 4564 cmmon32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5108 wrote to memory of 2988 5108 a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe 83 PID 5108 wrote to memory of 2988 5108 a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe 83 PID 5108 wrote to memory of 2988 5108 a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe 83 PID 2988 wrote to memory of 4120 2988 WScript.exe 84 PID 2988 wrote to memory of 4120 2988 WScript.exe 84 PID 2988 wrote to memory of 4120 2988 WScript.exe 84 PID 4120 wrote to memory of 4972 4120 fujab.exe 86 PID 4120 wrote to memory of 4972 4120 fujab.exe 86 PID 4120 wrote to memory of 4972 4120 fujab.exe 86 PID 4120 wrote to memory of 1492 4120 fujab.exe 87 PID 4120 wrote to memory of 1492 4120 fujab.exe 87 PID 4120 wrote to memory of 1492 4120 fujab.exe 87 PID 4120 wrote to memory of 1492 4120 fujab.exe 87 PID 4120 wrote to memory of 1492 4120 fujab.exe 87 PID 4120 wrote to memory of 1492 4120 fujab.exe 87 PID 1492 wrote to memory of 4564 1492 RegSvcs.exe 101 PID 1492 wrote to memory of 4564 1492 RegSvcs.exe 101 PID 1492 wrote to memory of 4564 1492 RegSvcs.exe 101 PID 4564 wrote to memory of 1408 4564 cmmon32.exe 105 PID 4564 wrote to memory of 1408 4564 cmmon32.exe 105 PID 4564 wrote to memory of 1408 4564 cmmon32.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe"C:\Users\Admin\AppData\Local\Temp\a52d0bc31a250c5dd5c84c75fca9b965955297d20f582d79849c17fb59c4c04f.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\4_19\dqpjc.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\4_19\fujab.exe"C:\Users\Admin\AppData\Local\Temp\4_19\fujab.exe" dkkwd.mkd4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"7⤵PID:1408
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD55fedb72dfc6e91cd725c629f14bb8193
SHA1183be10969a92612c99b454fa9c373cb51a14442
SHA25624f8a3e3028e79f6733323f442b256d15a415b8146144e6aa5faea8607d27e1c
SHA512fdda6c45f7f92587dc513e936998772841d4470f609e52c8cc1642ce96bebfba46d8ac9e0aec2a5e3948184f0e56d782789c1f550392def6de25effe386867bd
-
Filesize
1.1MB
MD5b5b4f7b97106aff4bd860cff0e13dcdc
SHA142ca977e0d14bde5d5831b7fe10f516186df3fc5
SHA2561dbad30b09c655ff987f25c312f56e9695d60105c240686d05d33941c854fa73
SHA5123e6742aea38c0cbfee8e5cb8f11d328c947c7e4fcca4604b498a7e254aacfe53cc8fc6171d5ed2db7755abb510c09036bfbb1e5a9d9b7b47a587b43c828e3185
-
Filesize
370KB
MD587a128053cdadb9f63e49d0fbe028193
SHA132a619ae4d4ea69460ef07407bf3e609d1665a5d
SHA256d267e67c2a99ef4a9dbf8546a2a8c9efb5cdd004b9b7cdec8539e2f248711398
SHA5129d41d5b19268bea794c4d566f2dc3902d16abf0ed0b14ef762b7ec824212291fbc647f55640f6c24f08acb7e489c78893beb99bbe5f9df00b09e65c1692e18cc
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
21KB
MD561b8d81488663b063944b798ca13f581
SHA1fab6888a27ca56d2b4ae0b7103ac77ed19939bac
SHA256f61e53b8d0b481399eef43cdbfb19d3c452fe6afd067e6860657dc47bacd0e7f
SHA512f65f16315aee56367e9b76390c1cdccf91b9deb00d865f976af5b9f07f916bcf52ba7d65833b020febac2e045f7f1710feaa7d4358b4b01ef54a1f7100511b6b