Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
INCENTIVE.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INCENTIVE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/wslelgm.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/wslelgm.dll
Resource
win10v2004-20241007-en
General
-
Target
INCENTIVE.exe
-
Size
435KB
-
MD5
a8dd9be8f05730b0b3da0aa0524d4041
-
SHA1
585ce6f6c047ae07daf2754cdd9f011f8bb8343b
-
SHA256
d30c25033a8cd080bc76463ad1ef591f61b66b5bf36aae6557d9664714908614
-
SHA512
7a584d294a8702f03ee91f6047c08a9e1ed56742f1a1d19ff9a99778ea5b1270b44d67cf0450fd5e98b75df7d47208e6259efec3c486dfe39e1d5ccd62713dc1
-
SSDEEP
12288:UbLr/1vBE8A8gJ+7rWMtE2bbOu8Nsw+Qw7n/C8c:UTNRWw77tE23Ol+n/C8c
Malware Config
Extracted
formbook
4.1
n62s
renabic.com
thesanaservice.xyz
lifemadegood.com
lovedowlin.com
dobro46.online
birotoafyon.com
haztol.xyz
917mainstreet.com
letshelpourselves.website
mysticalbloodmoon.com
legallyblondeattorney.com
metagoldenstate.com
ylhsklzjs.com
thejupitercraft.com
josephineclaimhelp.com
flowstorellc.com
eyeofthegate.com
asahi1500.com
ochumare.com
hieslerpark.com
rummeshop.com
metazoo.pro
tmejoin.chat
gitfbit.com
ejbehrgen.quest
coloradobuyerassistance.com
ca-59828.cfd
sunnydrizzle.com
exchangetested.com
rolex1-rc.com
pottcheck.com
wedding-planner-frankfurt.com
kemaiwei.online
placiditeimmobilerdz.com
ckbstack.net
deltachimarshall.com
adobeflashupdate.com
lunayazilim.com
sutonyenterprises.com
tothesupreme.space
illusionhacks.com
stylesbymomo.com
lebe-deine-natur.com
mehrerekreditevergleichen.info
melinaconner.com
lionesslegacysolutions.com
adambeshara.com
listingleadersadvantage.com
comerciodecalidad6sigma.com
stampedebkue.com
stfanytime.com
bellaciacorp.com
chaveirourgente.com
sweettreaties.com
sredingtonlaw.com
inboxy.info
2846567.com
ezsurfboards.com
immohuur.com
ridestrongtour.com
rohitpesto.com
cjhzyomu.com
benphillipstheatre.com
metaleafy.com
hoskyachts.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2512-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2512-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1344-19-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2208 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 INCENTIVE.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2100 set thread context of 2512 2100 INCENTIVE.exe 30 PID 2512 set thread context of 1216 2512 INCENTIVE.exe 21 PID 1344 set thread context of 1216 1344 NETSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INCENTIVE.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1344 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2512 INCENTIVE.exe 2512 INCENTIVE.exe 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE 1344 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2512 INCENTIVE.exe 2512 INCENTIVE.exe 2512 INCENTIVE.exe 1344 NETSTAT.EXE 1344 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2512 INCENTIVE.exe Token: SeDebugPrivilege 1344 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 2100 wrote to memory of 2512 2100 INCENTIVE.exe 30 PID 1216 wrote to memory of 1344 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1344 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1344 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1344 1216 Explorer.EXE 31 PID 1344 wrote to memory of 2208 1344 NETSTAT.EXE 32 PID 1344 wrote to memory of 2208 1344 NETSTAT.EXE 32 PID 1344 wrote to memory of 2208 1344 NETSTAT.EXE 32 PID 1344 wrote to memory of 2208 1344 NETSTAT.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INCENTIVE.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2208
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD57c38758347c69368b8bdff2f7a5ba99c
SHA170c318991c2515844ecc96714f5ad777d2e7e6a7
SHA256fcb8bd3b27beffa5255fbc8b485b038b321043eecd77fc21cf4798446c21a971
SHA5125d04876c8b1dd9a2d691d832471ad650ac85b95503c02aacde848f3b4f6f9f99c861b5a5f8e3e401145e6bbd78f59b8dddc8f24207a52d57afa3efe8940ecdac