Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
0CT2020PI.exe
Resource
win7-20240903-en
General
-
Target
0CT2020PI.exe
-
Size
449KB
-
MD5
0323276cec08509c8e789d02a72e91f6
-
SHA1
42e777f48b451e11bdc6a94966402318c30e1e18
-
SHA256
42e9c8cb3f59920b9ba876d6ada4d7a23c4feea3bfd5d93e6758da2ab1d470c5
-
SHA512
6e2d59de9016ef9e37ae76d1d94091c95a0b523c113d3b346b523ec788b4d0c596130c4ba76cab1729e50302cb25845d47be7d76b033c39b1b88f5bda3f25b0d
-
SSDEEP
6144:SqoZ0sHMGbBUkuetgzBgj8XG4p4Ir8ZOCfdaDe2ji7qK1GPxL1+zfZCpPnpmwuFs:SqoOT94IrQ5dFWif1GpL4UaSZNL
Malware Config
Extracted
formbook
4.1
wt6
mdjbjsc.com
twosparrowslsbusiness.com
captipe.info
spirtofafrica.com
teacher4today.com
d9masks.com
americanveteransparks.com
originvinylvermont.com
lifeguardboat.net
neynunescuritiba.com
4activelife.xyz
tiniytie.com
schirmenworld.com
nogbeter.com
bikerm.com
higherpurposeproject.com
melloband.com
cremgrs.com
chengyuanwai.com
multiplewealthsecrets.com
77ren.com
freedomwonks.com
tastethe.cloud
busty-italian.com
bingowheels.com
asmarasefera.com
snusmumriken.net
elearningdidatticaadistanza.com
tropicpendants.com
59dzb.com
hopitaldefrance.club
huanxifaka.com
precisioncoffeetools.com
skinjunkyph.com
littlebitlessrisky.com
freethegameboy.info
justiciaabogados.com
harumiyamanaka.com
alexisbekker.com
elzurrondgs.com
becurious.cloud
laeducacionadistancia.com
qualimproov.com
tregroespantry.com
la-voix-des-anges.com
supertron.online
5895hwy93s.com
eliosglaucoma.com
home-business-wealth.com
5gusaphones.com
sweetpeashihtzu.com
mrhadick.com
pizzeriavogelgryff.com
paraneon.com
massagecenterinkarama.com
votececilia.com
krcarts.com
shalagreen20yahoo.com
bird182trading.com
gjjt2019.com
casperbackup.net
usquite.site
postalpoet.com
oneagencyinc.com
ithomar.info
Signatures
-
Formbook family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0CT2020PI.exe -
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/3040-20-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3040-24-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/3040-26-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 0CT2020PI.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 0CT2020PI.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0CT2020PI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0CT2020PI.exe -
Deletes itself 1 IoCs
pid Process 2428 cmd.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0CT2020PI.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0CT2020PI.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0CT2020PI.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2268 set thread context of 3040 2268 0CT2020PI.exe 35 PID 3040 set thread context of 1112 3040 0CT2020PI.exe 20 PID 3040 set thread context of 1112 3040 0CT2020PI.exe 20 PID 2036 set thread context of 1112 2036 raserver.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0CT2020PI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2864 powershell.exe 3040 0CT2020PI.exe 3040 0CT2020PI.exe 3040 0CT2020PI.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe 2036 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3040 0CT2020PI.exe 3040 0CT2020PI.exe 3040 0CT2020PI.exe 3040 0CT2020PI.exe 2036 raserver.exe 2036 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 3040 0CT2020PI.exe Token: SeDebugPrivilege 2036 raserver.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2864 2268 0CT2020PI.exe 32 PID 2268 wrote to memory of 2864 2268 0CT2020PI.exe 32 PID 2268 wrote to memory of 2864 2268 0CT2020PI.exe 32 PID 2268 wrote to memory of 2864 2268 0CT2020PI.exe 32 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 2268 wrote to memory of 3040 2268 0CT2020PI.exe 35 PID 1112 wrote to memory of 2036 1112 Explorer.EXE 36 PID 1112 wrote to memory of 2036 1112 Explorer.EXE 36 PID 1112 wrote to memory of 2036 1112 Explorer.EXE 36 PID 1112 wrote to memory of 2036 1112 Explorer.EXE 36 PID 2036 wrote to memory of 2428 2036 raserver.exe 37 PID 2036 wrote to memory of 2428 2036 raserver.exe 37 PID 2036 wrote to memory of 2428 2036 raserver.exe 37 PID 2036 wrote to memory of 2428 2036 raserver.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Windows security modification
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2