Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
t9w7eLEE781llAk.exe
Resource
win7-20241010-en
General
-
Target
t9w7eLEE781llAk.exe
-
Size
1.3MB
-
MD5
3903301e617641ad7609ca7e09b4bb80
-
SHA1
2544df38e978f6aaf53ca5ccbb4078befa745351
-
SHA256
83f231a4e196b10089d16db819c71bfc5cc543fb55ea5ea63aee2d1285ff3dc3
-
SHA512
fcb598ae444827eb6bdac4567ffcb1b18af792f6d4d19e9b788543994ab5b53529c5df21d45681ec45cd76f49477fa1f789a0db0ad73f00ba6e75272af912851
-
SSDEEP
24576:B7YXNa2kita4HBIb6kFgaGvVNfZM58gN8GdvwPJORyyIwU6XOHtEga:hQa2kit4GksxMOPuvwIKX2Oyga
Malware Config
Extracted
formbook
4.1
ruje
pelezinhojj.com
tf2landscape.com
dianyuanb2b.com
franklinvisioncenter.net
sdamanagement.net
k7kitchendessert.com
receipeday1.xyz
urbandbracelets.com
lyticstnpasumo5.xyz
pingwangjinrong.com
crocodials.com
beeldacademie.com
loverlykids.com
yougouelectronics.com
ayushbeautypharma.com
fortinetpartnersynergy.com
olimplinfo.xyz
nzn2.com
3brlck.com
htp-352vvm.com
simpsonvillepies.com
handlowe.online
121chesterrd.com
ipswh.com
pledgenwork.com
vaidix.com
estabuloburgers.com
enzactashopping.com
funteefactory.com
darlingfarms.com
hada-kirara.club
masterairlines.com
ghettogypsies.com
influeri.com
muatoolngon.com
dmc--llc.com
dppmediasupplyfestival.com
dot925.com
92f76a.com
hellofix.biz
marhababd.com
xi4c49jppdgi.biz
paypay-tanke.xyz
rzlance.com
wellstabshot.com
brangers2.com
xn--tuarraigoespaa-2nb.com
cvhyd.com
balmitoff.com
supportsmercari.com
yuehuikongjian.com
mixedpatriotapparel.com
creative-constellation.com
3bgoe.info
bjyoulan.com
icebergdazzle.com
mikamike.com
heavenlyhighcreations.com
php.university
freenet-de.xyz
628951.com
gundummy.com
thetokyosubway.com
chandlerfphotography.com
regenerativepatients.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2292-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2056-17-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions t9w7eLEE781llAk.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2724 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools t9w7eLEE781llAk.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion t9w7eLEE781llAk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion t9w7eLEE781llAk.exe -
Deletes itself 1 IoCs
pid Process 1524 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum t9w7eLEE781llAk.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 t9w7eLEE781llAk.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 108 set thread context of 2292 108 t9w7eLEE781llAk.exe 32 PID 2292 set thread context of 1364 2292 t9w7eLEE781llAk.exe 20 PID 2056 set thread context of 1364 2056 cmd.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t9w7eLEE781llAk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2292 t9w7eLEE781llAk.exe 2292 t9w7eLEE781llAk.exe 2724 powershell.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe 2056 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2292 t9w7eLEE781llAk.exe 2292 t9w7eLEE781llAk.exe 2292 t9w7eLEE781llAk.exe 2056 cmd.exe 2056 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2292 t9w7eLEE781llAk.exe Token: SeDebugPrivilege 2724 powershell.exe Token: SeDebugPrivilege 2056 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 108 wrote to memory of 2724 108 t9w7eLEE781llAk.exe 29 PID 108 wrote to memory of 2724 108 t9w7eLEE781llAk.exe 29 PID 108 wrote to memory of 2724 108 t9w7eLEE781llAk.exe 29 PID 108 wrote to memory of 2724 108 t9w7eLEE781llAk.exe 29 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 108 wrote to memory of 2292 108 t9w7eLEE781llAk.exe 32 PID 1364 wrote to memory of 2056 1364 Explorer.EXE 33 PID 1364 wrote to memory of 2056 1364 Explorer.EXE 33 PID 1364 wrote to memory of 2056 1364 Explorer.EXE 33 PID 1364 wrote to memory of 2056 1364 Explorer.EXE 33 PID 2056 wrote to memory of 1524 2056 cmd.exe 34 PID 2056 wrote to memory of 1524 2056 cmd.exe 34 PID 2056 wrote to memory of 1524 2056 cmd.exe 34 PID 2056 wrote to memory of 1524 2056 cmd.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\t9w7eLEE781llAk.exe"C:\Users\Admin\AppData\Local\Temp\t9w7eLEE781llAk.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\t9w7eLEE781llAk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\t9w7eLEE781llAk.exe"C:\Users\Admin\AppData\Local\Temp\t9w7eLEE781llAk.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\t9w7eLEE781llAk.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1524
-
-