Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
Ayu4oCFjm9OnXOp.exe
Resource
win7-20240903-en
General
-
Target
Ayu4oCFjm9OnXOp.exe
-
Size
432KB
-
MD5
f87c0f240f62b4cca561779d456a119b
-
SHA1
c56269f25c5c23b2e7061e3b13c3e0c3fd27f7f7
-
SHA256
d30712d30f67be6cc42c17e78032d44f858ba45aa58c767b756874e25f6938df
-
SHA512
4ec4be2b361bf4c9c009a6b2c3c4dbe5cc4dec31f17d5507708fa7ce5f704452d03ee97dab6ad0f52e9972c2f919e20d243e9ce945aeeeee09a02ee43e6a649c
-
SSDEEP
12288:LgQts9tXZ0ybmhFZ9lrzfyXHFD4j5HgXm2ijk:LgBX+Amh791yVs1k
Malware Config
Extracted
formbook
4.1
ajr
cokefork.com
sunsabe.com
tactical-milsim.com
johnporcaro.com
quantqubit.com
ehrbar2012.com
dailymoringpages.com
masteronlineteams.com
signocomunicaciones.com
entrepreneur-de-demain.com
eve-echoes-data.com
readingbythewindow.com
quoteshark.net
mundoeconomic.com
bootlegmask.com
sporkedmissoula.com
claricitywealthplanning.net
lyotrade.net
brandtokitchens.com
blackstorymedia.com
armstrongramps.com
shinelinks.net
xhubstory.xyz
dannisconfessions.com
mycology.supplies
virtualinspectiontraining.com
usarmedforcesforbiden.com
theduneco.net
govirtualgym.com
pricemanmmi.com
eleanorandhick.com
grosgay.com
artmasteronline.com
psm-gen.com
strikermanagementgroup.com
tdhudsonfarms.com
nefkin.net
firewoodlogsbristol.com
csbaoxing.com
firestarterelectronics.com
igreels.today
janet-lorenz.com
bookyachting.com
kayarihats.com
wd7369.com
kvhchocen.com
madfishrods.com
yourprotectionguide.com
piao.mobi
loveinspiredtees.com
cric4c.com
tapchiotoxemay.net
engelhartweb.com
cgv-so.com
easyloop.email
xn--sss-ula.com
anunaysrivastava.com
1padrepio.com
getuewbessedre.com
achrafbarrou.com
misspinkk.com
717cary.com
myworldgay.com
alfcsg.com
elevatedqueensnc.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1584-19-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1584-22-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1584-27-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2232 set thread context of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 1584 set thread context of 1220 1584 Ayu4oCFjm9OnXOp.exe 21 PID 1584 set thread context of 1220 1584 Ayu4oCFjm9OnXOp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ayu4oCFjm9OnXOp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1584 Ayu4oCFjm9OnXOp.exe 1584 Ayu4oCFjm9OnXOp.exe 1584 Ayu4oCFjm9OnXOp.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1584 Ayu4oCFjm9OnXOp.exe 1584 Ayu4oCFjm9OnXOp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1584 Ayu4oCFjm9OnXOp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2620 2232 Ayu4oCFjm9OnXOp.exe 30 PID 2232 wrote to memory of 2620 2232 Ayu4oCFjm9OnXOp.exe 30 PID 2232 wrote to memory of 2620 2232 Ayu4oCFjm9OnXOp.exe 30 PID 2232 wrote to memory of 2620 2232 Ayu4oCFjm9OnXOp.exe 30 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32 PID 2232 wrote to memory of 1584 2232 Ayu4oCFjm9OnXOp.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\Ayu4oCFjm9OnXOp.exe"C:\Users\Admin\AppData\Local\Temp\Ayu4oCFjm9OnXOp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VfaatlT" /XML "C:\Users\Admin\AppData\Local\Temp\tmp49FB.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\Ayu4oCFjm9OnXOp.exe"C:\Users\Admin\AppData\Local\Temp\Ayu4oCFjm9OnXOp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52662afacd24f87c0a087f4c7453de98d
SHA1439e48d307bb7f78224b7659bc0d9e3acc194fa1
SHA256669222c748c91a6698c1b43b63effd8e19b8447af253af73333b273f18f2a8dc
SHA512f2da596c4ba5d9d1b64722f1a86663e212674c021475bb824633bf8a24589d1579852f5a53011635ca3db84e15b09d21d069cfac57077f3a5f78402cd159900a