Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/12/2024, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe
Resource
win7-20240903-en
General
-
Target
607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe
-
Size
409KB
-
MD5
2117808b6a0ded968c7f8f05c44e928a
-
SHA1
d165b25231a02318f183544701ff88663cf33810
-
SHA256
607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f
-
SHA512
0b5ecb350af8c014e3663604880c86c232cf20e980f59dec8a47e68b6ccbae41ec519723e525f0f8defdd3b37604675b6086f17f7a44c83eeb7e11ea0a7ac88a
-
SSDEEP
12288:40l2MJpjoRafuVY6t9Mawdbi/vI+mvJ2:4utoRzyKVwyvbmR
Malware Config
Extracted
formbook
4.1
zymg
1656heidorn.info
hnsymedical.com
annetteworkstars.com
nepgdivv.icu
shiboguangong.com
ribbondev.com
thegadgetheaven.com
aggtekstil.com
smoprogramme.com
gapmcs.com
alqaedestate.xyz
scottbruce.info
abilitytoachieve.online
cristamacd.com
itekapp.com
djretro.site
radiodigitalgroup.com
realestatelawyersacramento.com
retirocard.com
packshotanimation.com
massmediamonsters.com
behaviorofprice.com
infohpedia.com
livelikeeric.com
francandiris.com
belajarwso2.com
qdqprofese.xyz
jurassicpig.com
petunia.digital
oloprivacy.com
suxfi.com
xn--4-8sb8c.xn--p1acf
certifiedlifecoaching101.com
lovechatzone.com
kolayklik.com
sadobeshr.online
findfromusstore.com
rhrljt.com
mentalaltitude.net
labaronnerie.net
sunsterfze.com
desunonline.com
missionimmunity.com
meimeimaicar.com
lojasnbportugal.com
schedule.group
sowkevents.com
ucmasabacuskandivaliwest.com
dillonuk.com
aidac.net
phinebook.com
lemontomylime.com
travellacity.com
prettynailsnw2.com
collisionacuraandhonda.com
amirulfaiz.codes
facesaverpods.com
acneenemy.com
betternatureherbals.com
dpes5407.com
advertinsingpromo.com
le-soft.com
murray2020.com
dontknockmyhustle.com
cakeandscoops.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/8996-1860-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\notapad = "\"C:\\Users\\Admin\\AppData\\Roaming\\notapad.exe\"" 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe -
pid Process 9104 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 8996 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 9104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe Token: SeDebugPrivilege 9104 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2400 wrote to memory of 8972 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 31 PID 2400 wrote to memory of 8972 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 31 PID 2400 wrote to memory of 8972 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 31 PID 2400 wrote to memory of 8972 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 31 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 2400 wrote to memory of 8996 2400 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 32 PID 8972 wrote to memory of 9104 8972 WScript.exe 33 PID 8972 wrote to memory of 9104 8972 WScript.exe 33 PID 8972 wrote to memory of 9104 8972 WScript.exe 33 PID 8972 wrote to memory of 9104 8972 WScript.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe"C:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Fcfawtnttqigza.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\notapad.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9104
-
-
-
C:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exeC:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:8996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137B
MD5ab51ffae3c1beb809f59646481b495fc
SHA1b6e9d6ef0c4265b77442b3cab8e0fc7c95714df1
SHA256afed9764da68b96f87efc1e26726033d19eb8b83eb9eaf288295fb19e7cb4237
SHA512086acbefa580ad7c058aa1da05549d49eb1d58cfd5c4020d092550ca52f1a374ab4342a397b8a998fb4708621da344f204c505661dacf0edf37b224c8809dabf