Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yzoczjnuz.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
yzoczjnuz.exe
Resource
win10v2004-20241007-en
General
-
Target
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
-
Size
258KB
-
MD5
1ec9c287f61dee3f7cee2dc216e8596f
-
SHA1
2ce2bc72b3245447687fddc717dbc087573e9422
-
SHA256
0112b086f601e1d8a6d10ce4e798dd5eaf379127cb99d5a4b4f44ec708457ffd
-
SHA512
74568e623eec50754c1a0cf3e2db27e120777f8c80a80df94fac6f106b5b43d7a8a0f9b5375f86bdbc8122d49eac2127bb9167f2e6a7d658f2e9302fe8ab69e5
-
SSDEEP
6144:mbE/HUba5PBYCt37k0AUck3UcrhNQxy7bjTRuFsC42TjKoagrM0:mb/aLPtLk9rkEcrkxey82TjKzyp
Malware Config
Extracted
formbook
avcn
iQqc+b5jHA+W
gCI4O82LSsNA9tLkneHk6qA=
3I2qv1ZVYff+1Eo=
1YmmfbWjsiHmYcYjSVTf
NBsHMXP19khOJt2KMTEHhw==
phGkJ+uyWGow/gNhAcfxpNU4GLuUgXFcOg==
76S4kOajAII72kw=
YuoJB0X0+/LJtxIjSVTf
dfwI3SsaGogqBAZ4xhUx4B2g+LiF8XoFNA==
DPZ6AvfogdqUiZUq5K+3Jqk=
hnICZyINthreqpPpaLz9gQ==
yVh1ZpxISCr6h8b+MA==
/8Tg3VE+R7A/Bte6oC7kz/g4mz8Ufa4=
Nb5SuHlc+kxwGO5Oig5THgechA==
/NLWvgr7IAXcxzuueX/s6wJXODEI
/niFcKdVbQHAqH2y
Gac4n4YyRhvRYuK6
RtRr4pSUsjjOu7qsuv9FFBTuiHQ=
u1p5bblp59M=
qmh/ZV4PTj/IiNezISd2YeWw
OytJIyQdrqsi7m1+w0DnHgechA==
pnKGf31wEhjRYuK6
/sRZ7b6DEpWbNB8u7Lo=
ZfusFJWY0sF3VehQFSB2YeWw
GQEc9xj8ALmIcaFKcbI=
N63JmIB6FAuYatG4Ky12YeWw
Y/oM545ahn1BIJGlJC0vmA==
hSQ98e3sgOCmfGCeGCZ2YeWw
hTxZQoQ4Oif2zuXFvwkz2Ws0mD8Ufa4=
MZwxv8QDB+SL
kR3PK7hq/FPFoAp7P1E156E=
KqbM38c7HCKc
ZyDDBphO+nLfpQJoLiZ2YeWw
8l3oTRsQmYgVDfgqpHh2YeWw
xGr+g5RCTvf+1Eo=
UiJES+TuCY0HxqvhaLz9gQ==
qlKwKsjVpbqMZdA07ro=
tZqxjKSBXj1m6UBqIyZ2YeWw
f0RbT0k2oJdTNZbGiZnRe72cMdJuoqY=
PuWO3V1SXvf+1Eo=
GMLNsatjHA+W
MZC5jMWKm2DVrHS0JCV2YeWw
oUvubC/lT/CAZA==
5IabgcKHwqMc4Uwsi5M+Mef1klAA
GfOM+3RshFEiCIPwvMwyWQC6
V+Jz47KPEQZ6USBXigxRHgechA==
Ugie8sS3YKUeq8rwKQ==
w1FwZYyFGBnRYuK6
+HEY0y08YRAV9WKZP1E156E=
COLu4k5TYPf+1Eo=
ZgkmM7fE6bB9Hcg0YKs=
dxKYApZRAGUAq8rwKQ==
z1vqdH0oSRuwhAiIxlE156E=
IOHv+EM6eWYp5fFfX6s=
oz1hQZOawZhvXtFq1aR6PeasvHw=
9XqNg9rU/MipiaFKcbI=
7I4tmFb/jxzxeagRR6DX
Ow4i+gq5sJZ4UVE7aLz9gQ==
8NrgwgbLuYdYMUA4aLz9gQ==
pFjuNDi9Uqceq8rwKQ==
VhYzA1JIX/f+1Eo=
fjYXhj7IBuDRYuK6
O8TR12YcvUICzbojSVTf
+eLxuLJmrwWzemjF/0xYHgechA==
suntechgadget.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation yzoczjnuz.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 yzoczjnuz.exe -
Loads dropped DLL 3 IoCs
pid Process 2876 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 2700 yzoczjnuz.exe 2800 yzoczjnuz.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2700 set thread context of 2800 2700 yzoczjnuz.exe 31 PID 2800 set thread context of 1256 2800 yzoczjnuz.exe 21 PID 2800 set thread context of 1256 2800 yzoczjnuz.exe 21 PID 2620 set thread context of 1256 2620 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzoczjnuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzoczjnuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe 2620 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2800 yzoczjnuz.exe 2620 cmstp.exe 2620 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2800 yzoczjnuz.exe Token: SeDebugPrivilege 2620 cmstp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2700 2876 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 30 PID 2876 wrote to memory of 2700 2876 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 30 PID 2876 wrote to memory of 2700 2876 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 30 PID 2876 wrote to memory of 2700 2876 Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe 30 PID 2700 wrote to memory of 2800 2700 yzoczjnuz.exe 31 PID 2700 wrote to memory of 2800 2700 yzoczjnuz.exe 31 PID 2700 wrote to memory of 2800 2700 yzoczjnuz.exe 31 PID 2700 wrote to memory of 2800 2700 yzoczjnuz.exe 31 PID 2700 wrote to memory of 2800 2700 yzoczjnuz.exe 31 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32 PID 2800 wrote to memory of 2620 2800 yzoczjnuz.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe"C:\Users\Admin\AppData\Local\Temp\Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"4⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD51e4e5fe5153c59256f6178ac541e53d0
SHA11ca49ca82dc80310e017f1d7be8c1e36eba01d24
SHA2561f68a8c3efb02d3cefb6e49d8dba71acb16bbeaaa1686913120ad42d2991626a
SHA51298e8d172d897a16cc7ca47c1e9d9b91f36b16a48733ab6c4d79169d7ec72416ccb341c9474fbe56dec4c39f3f5ad31b7bd4611aaa00cc8786640c4bc56bf8ec1
-
Filesize
4KB
MD5bf9a3bdedbd39546a400d1cd1850b4aa
SHA1c915bb9ad5ce4defd8c5cfee4433d1dde789120c
SHA2566830feee189372fd3145f58ce1a7c38203b5ac35b326446980c607bfe129c355
SHA512117d5bb80f1a12abff70d8979abb19a6ec7a5dfa9c87e307b4defcfefde36d99c031efba4455824ce2243ef5726d784f2aae99915966282b5a341dc063345d4b
-
Filesize
59KB
MD560ebe600e2d67c0877426dfd53be96d7
SHA183c0f3f77bec5df19f20ab0706ca736bd5e6e0d6
SHA256fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648
SHA512f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb