Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Payment Advice - Advice Ref[A1RxGSqgxSF3] Priority payment Customer Ref[2000015497].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yzoczjnuz.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
yzoczjnuz.exe
Resource
win10v2004-20241007-en
General
-
Target
yzoczjnuz.exe
-
Size
59KB
-
MD5
60ebe600e2d67c0877426dfd53be96d7
-
SHA1
83c0f3f77bec5df19f20ab0706ca736bd5e6e0d6
-
SHA256
fad978413cf6a36fbd03d3c96a5a08d0cf227e17710abddc06e73ae1913de648
-
SHA512
f0e2839211d84f2247a654f51ff07fe4c89f3d9ed71558e34479d8afe08aa9f606a65d1e53eaa0bea8287537de8f7e50427402f33a0339739b4dff7405a127eb
-
SSDEEP
1536:WgvtLu0ZssXg2J2m3K5n2ETMCZQsuyXn5QnQC:WACsPEvMCi32nCnQC
Malware Config
Extracted
formbook
avcn
iQqc+b5jHA+W
gCI4O82LSsNA9tLkneHk6qA=
3I2qv1ZVYff+1Eo=
1YmmfbWjsiHmYcYjSVTf
NBsHMXP19khOJt2KMTEHhw==
phGkJ+uyWGow/gNhAcfxpNU4GLuUgXFcOg==
76S4kOajAII72kw=
YuoJB0X0+/LJtxIjSVTf
dfwI3SsaGogqBAZ4xhUx4B2g+LiF8XoFNA==
DPZ6AvfogdqUiZUq5K+3Jqk=
hnICZyINthreqpPpaLz9gQ==
yVh1ZpxISCr6h8b+MA==
/8Tg3VE+R7A/Bte6oC7kz/g4mz8Ufa4=
Nb5SuHlc+kxwGO5Oig5THgechA==
/NLWvgr7IAXcxzuueX/s6wJXODEI
/niFcKdVbQHAqH2y
Gac4n4YyRhvRYuK6
RtRr4pSUsjjOu7qsuv9FFBTuiHQ=
u1p5bblp59M=
qmh/ZV4PTj/IiNezISd2YeWw
OytJIyQdrqsi7m1+w0DnHgechA==
pnKGf31wEhjRYuK6
/sRZ7b6DEpWbNB8u7Lo=
ZfusFJWY0sF3VehQFSB2YeWw
GQEc9xj8ALmIcaFKcbI=
N63JmIB6FAuYatG4Ky12YeWw
Y/oM545ahn1BIJGlJC0vmA==
hSQ98e3sgOCmfGCeGCZ2YeWw
hTxZQoQ4Oif2zuXFvwkz2Ws0mD8Ufa4=
MZwxv8QDB+SL
kR3PK7hq/FPFoAp7P1E156E=
KqbM38c7HCKc
ZyDDBphO+nLfpQJoLiZ2YeWw
8l3oTRsQmYgVDfgqpHh2YeWw
xGr+g5RCTvf+1Eo=
UiJES+TuCY0HxqvhaLz9gQ==
qlKwKsjVpbqMZdA07ro=
tZqxjKSBXj1m6UBqIyZ2YeWw
f0RbT0k2oJdTNZbGiZnRe72cMdJuoqY=
PuWO3V1SXvf+1Eo=
GMLNsatjHA+W
MZC5jMWKm2DVrHS0JCV2YeWw
oUvubC/lT/CAZA==
5IabgcKHwqMc4Uwsi5M+Mef1klAA
GfOM+3RshFEiCIPwvMwyWQC6
V+Jz47KPEQZ6USBXigxRHgechA==
Ugie8sS3YKUeq8rwKQ==
w1FwZYyFGBnRYuK6
+HEY0y08YRAV9WKZP1E156E=
COLu4k5TYPf+1Eo=
ZgkmM7fE6bB9Hcg0YKs=
dxKYApZRAGUAq8rwKQ==
z1vqdH0oSRuwhAiIxlE156E=
IOHv+EM6eWYp5fFfX6s=
oz1hQZOawZhvXtFq1aR6PeasvHw=
9XqNg9rU/MipiaFKcbI=
7I4tmFb/jxzxeagRR6DX
Ow4i+gq5sJZ4UVE7aLz9gQ==
8NrgwgbLuYdYMUA4aLz9gQ==
pFjuNDi9Uqceq8rwKQ==
VhYzA1JIX/f+1Eo=
fjYXhj7IBuDRYuK6
O8TR12YcvUICzbojSVTf
+eLxuLJmrwWzemjF/0xYHgechA==
suntechgadget.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation yzoczjnuz.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2084 set thread context of 1212 2084 yzoczjnuz.exe 30 PID 1212 set thread context of 1424 1212 yzoczjnuz.exe 21 PID 880 set thread context of 1424 880 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzoczjnuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1212 yzoczjnuz.exe 1212 yzoczjnuz.exe 1212 yzoczjnuz.exe 1212 yzoczjnuz.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe 880 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1212 yzoczjnuz.exe 1212 yzoczjnuz.exe 1212 yzoczjnuz.exe 880 wscript.exe 880 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1212 yzoczjnuz.exe Token: SeDebugPrivilege 880 wscript.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1212 2084 yzoczjnuz.exe 30 PID 2084 wrote to memory of 1212 2084 yzoczjnuz.exe 30 PID 2084 wrote to memory of 1212 2084 yzoczjnuz.exe 30 PID 2084 wrote to memory of 1212 2084 yzoczjnuz.exe 30 PID 2084 wrote to memory of 1212 2084 yzoczjnuz.exe 30 PID 1424 wrote to memory of 880 1424 Explorer.EXE 31 PID 1424 wrote to memory of 880 1424 Explorer.EXE 31 PID 1424 wrote to memory of 880 1424 Explorer.EXE 31 PID 1424 wrote to memory of 880 1424 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"C:\Users\Admin\AppData\Local\Temp\yzoczjnuz.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:880
-