Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Copia de transferencia bancaria.exe
Resource
win7-20241010-en
General
-
Target
Copia de transferencia bancaria.exe
-
Size
971KB
-
MD5
8ee464229bdaac78e1354a7ff334af85
-
SHA1
a566511090198f92b82e07c1675b256f6c91e923
-
SHA256
8095979c4153bbcced38a6ee12589fbb67f356535a91cf22e26413ee3f1c4e34
-
SHA512
836274df2b83188718400c22b71becbf445d2f128cdfbc342cb62cb3655cc70441a638705911c449f500748e7be13082a11ac4d261a03e9c805cdf10e3e1ab87
-
SSDEEP
12288:Ntcg0r9tDZddpnLnv2hVSKRytHxnrceHMcrIaPy1FTAUI4kSxv1/:Nt893hSh0K0pxVIaPy1FW41
Malware Config
Extracted
formbook
4.1
de19
predictivemedicine.life
coloringforthepeople.com
project154.com
usmmexchange.com
bootzxon.com
chaoge730.com
thenaci.com
moviestarplent.com
musicallyengaged.com
sneakerspark.net
yudist.com
apqrcx.xyz
traceless.tel
guardlanavionics.com
usadogrights.com
openei.club
aventusluxury.com
telewebin.com
godrej-threeparks.net
solbysol.com
tarahomesolutions.com
riaairlines.com
berrygooddesigns.com
assistance-bouygues-telecom.com
s4hbgroupds.com
lago-vista-ata-martial-arts.com
icishopping.com
itkonsult.online
knightsbridgecdd.com
wrightstowntigers.com
gzxsb.com
teenanxiety.co
shanepisko.com
fftblogs.com
br-cleaning.plus
miami1688.cool
necomw.com
americanfreightsystemsinc.com
veirdmusic.com
brandnicer.com
ones77motiving.com
stephensthebakers.com
thaicomfortfood.com
mooreandsonsak.net
19838888.com
hay-yusspd-osaka-japan.life
junaidsubhani.tech
cadengineer.co.uk
camaratechsevilla.com
scholarsinfoguide.com
listcord.net
bossyoushu.com
robertkslaughter.xyz
locallywhitstable.co.uk
rsbtileinc.com
eviexo.com
lung-cancer-treatment-43816.com
lizandpeter.com
iberiahomes.institute
buyeber.net
hanarsedivy.com
fielsp.online
kuav7.com
1classlawncare.com
lanyuelou.com
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/840-31-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/840-43-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/840-75-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2856-78-0x0000000001040000-0x000000000106F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3908 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Copia de transferencia bancaria.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1072 set thread context of 840 1072 Copia de transferencia bancaria.exe 104 PID 840 set thread context of 3512 840 RegSvcs.exe 56 PID 840 set thread context of 3512 840 RegSvcs.exe 56 PID 2856 set thread context of 3512 2856 cmmon32.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Copia de transferencia bancaria.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3908 powershell.exe 1072 Copia de transferencia bancaria.exe 1072 Copia de transferencia bancaria.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 3908 powershell.exe 840 RegSvcs.exe 840 RegSvcs.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 840 RegSvcs.exe 2856 cmmon32.exe 2856 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3908 powershell.exe Token: SeDebugPrivilege 1072 Copia de transferencia bancaria.exe Token: SeDebugPrivilege 840 RegSvcs.exe Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE Token: SeDebugPrivilege 2856 cmmon32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1072 wrote to memory of 3908 1072 Copia de transferencia bancaria.exe 99 PID 1072 wrote to memory of 3908 1072 Copia de transferencia bancaria.exe 99 PID 1072 wrote to memory of 3908 1072 Copia de transferencia bancaria.exe 99 PID 1072 wrote to memory of 3528 1072 Copia de transferencia bancaria.exe 101 PID 1072 wrote to memory of 3528 1072 Copia de transferencia bancaria.exe 101 PID 1072 wrote to memory of 3528 1072 Copia de transferencia bancaria.exe 101 PID 1072 wrote to memory of 4436 1072 Copia de transferencia bancaria.exe 103 PID 1072 wrote to memory of 4436 1072 Copia de transferencia bancaria.exe 103 PID 1072 wrote to memory of 4436 1072 Copia de transferencia bancaria.exe 103 PID 1072 wrote to memory of 840 1072 Copia de transferencia bancaria.exe 104 PID 1072 wrote to memory of 840 1072 Copia de transferencia bancaria.exe 104 PID 1072 wrote to memory of 840 1072 Copia de transferencia bancaria.exe 104 PID 1072 wrote to memory of 840 1072 Copia de transferencia bancaria.exe 104 PID 1072 wrote to memory of 840 1072 Copia de transferencia bancaria.exe 104 PID 1072 wrote to memory of 840 1072 Copia de transferencia bancaria.exe 104 PID 3512 wrote to memory of 2856 3512 Explorer.EXE 105 PID 3512 wrote to memory of 2856 3512 Explorer.EXE 105 PID 3512 wrote to memory of 2856 3512 Explorer.EXE 105 PID 2856 wrote to memory of 64 2856 cmmon32.exe 106 PID 2856 wrote to memory of 64 2856 cmmon32.exe 106 PID 2856 wrote to memory of 64 2856 cmmon32.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Copia de transferencia bancaria.exe"C:\Users\Admin\AppData\Local\Temp\Copia de transferencia bancaria.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\inKcSqSKZsI.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\inKcSqSKZsI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3999.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:64
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e4d23e7c71f5f708fa993a096c565880
SHA14aab69b8bfdfdb3ed19e3fc29169666432a9bf76
SHA2565ed7b084b5c5dbac7ea8be4207465a87b063839a59a7e0e2fc0893f4b9309d6e
SHA5127278d2b1ca99bfa973eee3caf4eb22795d4feb7a0ae9c4eeaa6b7efb2f74ffb8dd23bbd927c95912ccb222f7d5c6d7f508809f926528d19b51a39c27ceaabb92