Analysis
-
max time kernel
147s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Copia de transferencia bancaria.exe
Resource
win7-20241010-en
General
-
Target
Copia de transferencia bancaria.exe
-
Size
971KB
-
MD5
8ee464229bdaac78e1354a7ff334af85
-
SHA1
a566511090198f92b82e07c1675b256f6c91e923
-
SHA256
8095979c4153bbcced38a6ee12589fbb67f356535a91cf22e26413ee3f1c4e34
-
SHA512
836274df2b83188718400c22b71becbf445d2f128cdfbc342cb62cb3655cc70441a638705911c449f500748e7be13082a11ac4d261a03e9c805cdf10e3e1ab87
-
SSDEEP
12288:Ntcg0r9tDZddpnLnv2hVSKRytHxnrceHMcrIaPy1FTAUI4kSxv1/:Nt893hSh0K0pxVIaPy1FW41
Malware Config
Extracted
formbook
4.1
de19
predictivemedicine.life
coloringforthepeople.com
project154.com
usmmexchange.com
bootzxon.com
chaoge730.com
thenaci.com
moviestarplent.com
musicallyengaged.com
sneakerspark.net
yudist.com
apqrcx.xyz
traceless.tel
guardlanavionics.com
usadogrights.com
openei.club
aventusluxury.com
telewebin.com
godrej-threeparks.net
solbysol.com
tarahomesolutions.com
riaairlines.com
berrygooddesigns.com
assistance-bouygues-telecom.com
s4hbgroupds.com
lago-vista-ata-martial-arts.com
icishopping.com
itkonsult.online
knightsbridgecdd.com
wrightstowntigers.com
gzxsb.com
teenanxiety.co
shanepisko.com
fftblogs.com
br-cleaning.plus
miami1688.cool
necomw.com
americanfreightsystemsinc.com
veirdmusic.com
brandnicer.com
ones77motiving.com
stephensthebakers.com
thaicomfortfood.com
mooreandsonsak.net
19838888.com
hay-yusspd-osaka-japan.life
junaidsubhani.tech
cadengineer.co.uk
camaratechsevilla.com
scholarsinfoguide.com
listcord.net
bossyoushu.com
robertkslaughter.xyz
locallywhitstable.co.uk
rsbtileinc.com
eviexo.com
lung-cancer-treatment-43816.com
lizandpeter.com
iberiahomes.institute
buyeber.net
hanarsedivy.com
fielsp.online
kuav7.com
1classlawncare.com
lanyuelou.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2796-21-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2912-28-0x0000000000110000-0x000000000013F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2836 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2248 set thread context of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2796 set thread context of 1220 2796 RegSvcs.exe 21 PID 2912 set thread context of 1220 2912 msiexec.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Copia de transferencia bancaria.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2796 RegSvcs.exe 2796 RegSvcs.exe 2836 powershell.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe 2912 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2796 RegSvcs.exe 2796 RegSvcs.exe 2796 RegSvcs.exe 2912 msiexec.exe 2912 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2796 RegSvcs.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2912 msiexec.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2836 2248 Copia de transferencia bancaria.exe 29 PID 2248 wrote to memory of 2836 2248 Copia de transferencia bancaria.exe 29 PID 2248 wrote to memory of 2836 2248 Copia de transferencia bancaria.exe 29 PID 2248 wrote to memory of 2836 2248 Copia de transferencia bancaria.exe 29 PID 2248 wrote to memory of 2460 2248 Copia de transferencia bancaria.exe 31 PID 2248 wrote to memory of 2460 2248 Copia de transferencia bancaria.exe 31 PID 2248 wrote to memory of 2460 2248 Copia de transferencia bancaria.exe 31 PID 2248 wrote to memory of 2460 2248 Copia de transferencia bancaria.exe 31 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 2248 wrote to memory of 2796 2248 Copia de transferencia bancaria.exe 33 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 1220 wrote to memory of 2912 1220 Explorer.EXE 34 PID 2912 wrote to memory of 1696 2912 msiexec.exe 35 PID 2912 wrote to memory of 1696 2912 msiexec.exe 35 PID 2912 wrote to memory of 1696 2912 msiexec.exe 35 PID 2912 wrote to memory of 1696 2912 msiexec.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Copia de transferencia bancaria.exe"C:\Users\Admin\AppData\Local\Temp\Copia de transferencia bancaria.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\inKcSqSKZsI.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\inKcSqSKZsI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6B7F.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa794ad0879d91fdf131ad92d0f68bcc
SHA179d816370f9d45846a83b3bb29bc9d2258516b48
SHA2568330df5cec2598e53e1abcaeb56fe2dfe0dcda77bc4a667daa1c342ff3294302
SHA512ce2dc4a1f20cd42504ec1f35ec42cebbb578d34ccb2f12bc131951e7eed398d1ac47bd628d6c7f933eee4fe63b80823c2f6626cb2333337b21c77bf682d8658b