Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe
Resource
win7-20240903-en
General
-
Target
607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe
-
Size
409KB
-
MD5
2117808b6a0ded968c7f8f05c44e928a
-
SHA1
d165b25231a02318f183544701ff88663cf33810
-
SHA256
607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f
-
SHA512
0b5ecb350af8c014e3663604880c86c232cf20e980f59dec8a47e68b6ccbae41ec519723e525f0f8defdd3b37604675b6086f17f7a44c83eeb7e11ea0a7ac88a
-
SSDEEP
12288:40l2MJpjoRafuVY6t9Mawdbi/vI+mvJ2:4utoRzyKVwyvbmR
Malware Config
Extracted
formbook
4.1
zymg
1656heidorn.info
hnsymedical.com
annetteworkstars.com
nepgdivv.icu
shiboguangong.com
ribbondev.com
thegadgetheaven.com
aggtekstil.com
smoprogramme.com
gapmcs.com
alqaedestate.xyz
scottbruce.info
abilitytoachieve.online
cristamacd.com
itekapp.com
djretro.site
radiodigitalgroup.com
realestatelawyersacramento.com
retirocard.com
packshotanimation.com
massmediamonsters.com
behaviorofprice.com
infohpedia.com
livelikeeric.com
francandiris.com
belajarwso2.com
qdqprofese.xyz
jurassicpig.com
petunia.digital
oloprivacy.com
suxfi.com
xn--4-8sb8c.xn--p1acf
certifiedlifecoaching101.com
lovechatzone.com
kolayklik.com
sadobeshr.online
findfromusstore.com
rhrljt.com
mentalaltitude.net
labaronnerie.net
sunsterfze.com
desunonline.com
missionimmunity.com
meimeimaicar.com
lojasnbportugal.com
schedule.group
sowkevents.com
ucmasabacuskandivaliwest.com
dillonuk.com
aidac.net
phinebook.com
lemontomylime.com
travellacity.com
prettynailsnw2.com
collisionacuraandhonda.com
amirulfaiz.codes
facesaverpods.com
acneenemy.com
betternatureherbals.com
dpes5407.com
advertinsingpromo.com
le-soft.com
murray2020.com
dontknockmyhustle.com
cakeandscoops.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5692-1861-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\notapad = "\"C:\\Users\\Admin\\AppData\\Roaming\\notapad.exe\"" 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe -
pid Process 5760 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4056 set thread context of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 5692 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 5692 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 5760 powershell.exe 5760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe Token: SeDebugPrivilege 5760 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4056 wrote to memory of 5660 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 99 PID 4056 wrote to memory of 5660 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 99 PID 4056 wrote to memory of 5660 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 99 PID 4056 wrote to memory of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 PID 4056 wrote to memory of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 PID 4056 wrote to memory of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 PID 4056 wrote to memory of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 PID 4056 wrote to memory of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 PID 4056 wrote to memory of 5692 4056 607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe 100 PID 5660 wrote to memory of 5760 5660 WScript.exe 101 PID 5660 wrote to memory of 5760 5660 WScript.exe 101 PID 5660 wrote to memory of 5760 5660 WScript.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe"C:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Fcfawtnttqigza.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\notapad.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exeC:\Users\Admin\AppData\Local\Temp\607995b16cd6300fde94e5613d5c708331f0e7b2b91ea6210a0f6b3a5cbdf64f.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137B
MD5ab51ffae3c1beb809f59646481b495fc
SHA1b6e9d6ef0c4265b77442b3cab8e0fc7c95714df1
SHA256afed9764da68b96f87efc1e26726033d19eb8b83eb9eaf288295fb19e7cb4237
SHA512086acbefa580ad7c058aa1da05549d49eb1d58cfd5c4020d092550ca52f1a374ab4342a397b8a998fb4708621da344f204c505661dacf0edf37b224c8809dabf
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82