Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
0CT2020PI.exe
Resource
win7-20240903-en
General
-
Target
0CT2020PI.exe
-
Size
449KB
-
MD5
0323276cec08509c8e789d02a72e91f6
-
SHA1
42e777f48b451e11bdc6a94966402318c30e1e18
-
SHA256
42e9c8cb3f59920b9ba876d6ada4d7a23c4feea3bfd5d93e6758da2ab1d470c5
-
SHA512
6e2d59de9016ef9e37ae76d1d94091c95a0b523c113d3b346b523ec788b4d0c596130c4ba76cab1729e50302cb25845d47be7d76b033c39b1b88f5bda3f25b0d
-
SSDEEP
6144:SqoZ0sHMGbBUkuetgzBgj8XG4p4Ir8ZOCfdaDe2ji7qK1GPxL1+zfZCpPnpmwuFs:SqoOT94IrQ5dFWif1GpL4UaSZNL
Malware Config
Extracted
formbook
4.1
wt6
mdjbjsc.com
twosparrowslsbusiness.com
captipe.info
spirtofafrica.com
teacher4today.com
d9masks.com
americanveteransparks.com
originvinylvermont.com
lifeguardboat.net
neynunescuritiba.com
4activelife.xyz
tiniytie.com
schirmenworld.com
nogbeter.com
bikerm.com
higherpurposeproject.com
melloband.com
cremgrs.com
chengyuanwai.com
multiplewealthsecrets.com
77ren.com
freedomwonks.com
tastethe.cloud
busty-italian.com
bingowheels.com
asmarasefera.com
snusmumriken.net
elearningdidatticaadistanza.com
tropicpendants.com
59dzb.com
hopitaldefrance.club
huanxifaka.com
precisioncoffeetools.com
skinjunkyph.com
littlebitlessrisky.com
freethegameboy.info
justiciaabogados.com
harumiyamanaka.com
alexisbekker.com
elzurrondgs.com
becurious.cloud
laeducacionadistancia.com
qualimproov.com
tregroespantry.com
la-voix-des-anges.com
supertron.online
5895hwy93s.com
eliosglaucoma.com
home-business-wealth.com
5gusaphones.com
sweetpeashihtzu.com
mrhadick.com
pizzeriavogelgryff.com
paraneon.com
massagecenterinkarama.com
votececilia.com
krcarts.com
shalagreen20yahoo.com
bird182trading.com
gjjt2019.com
casperbackup.net
usquite.site
postalpoet.com
oneagencyinc.com
ithomar.info
Signatures
-
Formbook family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0CT2020PI.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0CT2020PI.exe -
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3240-59-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/3240-64-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 0CT2020PI.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 0CT2020PI.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0CT2020PI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0CT2020PI.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0CT2020PI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0CT2020PI.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0CT2020PI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0CT2020PI.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3968 set thread context of 3240 3968 0CT2020PI.exe 93 PID 3240 set thread context of 3392 3240 0CT2020PI.exe 56 PID 2588 set thread context of 3392 2588 ipconfig.exe 56 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\J9rh\wpxmtfhr.exe ipconfig.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0CT2020PI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2588 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4620 powershell.exe 4620 powershell.exe 3240 0CT2020PI.exe 3240 0CT2020PI.exe 3240 0CT2020PI.exe 3240 0CT2020PI.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe 2588 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3240 0CT2020PI.exe 3240 0CT2020PI.exe 3240 0CT2020PI.exe 2588 ipconfig.exe 2588 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 3240 0CT2020PI.exe Token: SeDebugPrivilege 2588 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4620 3968 0CT2020PI.exe 91 PID 3968 wrote to memory of 4620 3968 0CT2020PI.exe 91 PID 3968 wrote to memory of 4620 3968 0CT2020PI.exe 91 PID 3968 wrote to memory of 3240 3968 0CT2020PI.exe 93 PID 3968 wrote to memory of 3240 3968 0CT2020PI.exe 93 PID 3968 wrote to memory of 3240 3968 0CT2020PI.exe 93 PID 3968 wrote to memory of 3240 3968 0CT2020PI.exe 93 PID 3968 wrote to memory of 3240 3968 0CT2020PI.exe 93 PID 3968 wrote to memory of 3240 3968 0CT2020PI.exe 93 PID 3392 wrote to memory of 2588 3392 Explorer.EXE 94 PID 3392 wrote to memory of 2588 3392 Explorer.EXE 94 PID 3392 wrote to memory of 2588 3392 Explorer.EXE 94 PID 2588 wrote to memory of 2432 2588 ipconfig.exe 95 PID 2588 wrote to memory of 2432 2588 ipconfig.exe 95 PID 2588 wrote to memory of 2432 2588 ipconfig.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Windows security modification
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\0CT2020PI.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82