Analysis
-
max time kernel
146s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
BankCertificateFilepdf00.exe
Resource
win7-20240903-en
General
-
Target
BankCertificateFilepdf00.exe
-
Size
724KB
-
MD5
595417bf40423929716d259aa6151e68
-
SHA1
3adf3f7db8401715e7b73c50e1feee8b034b2f88
-
SHA256
e69d37275cc3b52a9d3a26f76073191ab8f59901781b5ef2859f33dee2252ddc
-
SHA512
03122a9d4fa3b0426d3e10bb1700c6060300b391fd1fb49242c694485a753dc7e6a5d5edc9147f469774b04f3444bf77a3ebe930c68275456309b99ca50a1f60
-
SSDEEP
12288:sbnXloJNhQ/cWS7stu8HP1RhXtriB5VIenigsc5YK9ygCvSDH6Way22keYeJa9:eiJN+UVsw2P3tcnRYK6SDh4eE
Malware Config
Extracted
formbook
4.1
a02d
coplus.market
oofing-jobs-74429.bond
healchemists.xyz
oofcarpenternearme-jp.xyz
enewebsolutions.online
harepoint.legal
88977.club
omptables.xyz
eat-pumps-31610.bond
endown.graphics
amsexgirls.website
ovevibes.xyz
u-thiensu.online
yblinds.xyz
rumpchiefofstaff.store
erzog.fun
rrm.lat
agiclime.pro
agaviet59.shop
lbdoanhnhan.net
irvasenitpalvelut.online
strange.store
bsidiansurvival.shop
lown.bond
irrorbd.online
idzev.shop
tyleyourvibe.shop
qweemaildwqfewew.live
sychology-degree-92767.bond
orklift-jobs-76114.bond
nytymeoccassions.store
nfluencer-marketing-41832.bond
rh799295w.vip
066661a23.buzz
m235a.net
omestur.online
nalyzator.fun
itchen-remodeling-41686.bond
ontenbully.shop
oratrading.best
tiwebu.info
lueticks.shop
ocubox.xyz
q33.lat
earch-solar-installer-top.today
ceqne.vip
8betpragmatic.store
oftware-download-37623.bond
oofing-jobs-29700.bond
vorachem.xyz
ruck-driver-jobs-58337.bond
om-exchange-nft370213.sbs
jfghnxnvdfgh.icu
inhngoc.webcam
ruck-driver-jobs-86708.bond
oftware-engineering-27699.bond
nfoyl.xyz
estionprojetsccpm.online
reativesos.studio
ammamiaitalia.net
4cw.lat
oofighters.xyz
ukusindo4dpools.net
yhbvc.xyz
8435.pizza
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2632-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2632-27-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/264-30-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2780 powershell.exe 2240 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2316 set thread context of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2632 set thread context of 1204 2632 RegSvcs.exe 21 PID 2632 set thread context of 1204 2632 RegSvcs.exe 21 PID 264 set thread context of 1204 264 chkdsk.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BankCertificateFilepdf00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2316 BankCertificateFilepdf00.exe 2240 powershell.exe 2780 powershell.exe 2316 BankCertificateFilepdf00.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe 264 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 264 chkdsk.exe 264 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2316 BankCertificateFilepdf00.exe Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2632 RegSvcs.exe Token: SeDebugPrivilege 264 chkdsk.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2240 2316 BankCertificateFilepdf00.exe 30 PID 2316 wrote to memory of 2240 2316 BankCertificateFilepdf00.exe 30 PID 2316 wrote to memory of 2240 2316 BankCertificateFilepdf00.exe 30 PID 2316 wrote to memory of 2240 2316 BankCertificateFilepdf00.exe 30 PID 2316 wrote to memory of 2780 2316 BankCertificateFilepdf00.exe 32 PID 2316 wrote to memory of 2780 2316 BankCertificateFilepdf00.exe 32 PID 2316 wrote to memory of 2780 2316 BankCertificateFilepdf00.exe 32 PID 2316 wrote to memory of 2780 2316 BankCertificateFilepdf00.exe 32 PID 2316 wrote to memory of 2840 2316 BankCertificateFilepdf00.exe 34 PID 2316 wrote to memory of 2840 2316 BankCertificateFilepdf00.exe 34 PID 2316 wrote to memory of 2840 2316 BankCertificateFilepdf00.exe 34 PID 2316 wrote to memory of 2840 2316 BankCertificateFilepdf00.exe 34 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 2316 wrote to memory of 2632 2316 BankCertificateFilepdf00.exe 36 PID 1204 wrote to memory of 264 1204 Explorer.EXE 37 PID 1204 wrote to memory of 264 1204 Explorer.EXE 37 PID 1204 wrote to memory of 264 1204 Explorer.EXE 37 PID 1204 wrote to memory of 264 1204 Explorer.EXE 37 PID 264 wrote to memory of 1032 264 chkdsk.exe 38 PID 264 wrote to memory of 1032 264 chkdsk.exe 38 PID 264 wrote to memory of 1032 264 chkdsk.exe 38 PID 264 wrote to memory of 1032 264 chkdsk.exe 38
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\BankCertificateFilepdf00.exe"C:\Users\Admin\AppData\Local\Temp\BankCertificateFilepdf00.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\BankCertificateFilepdf00.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HPkPojK.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HPkPojK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B86.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dacefc26c90ef18dd09cc4ce4915e8dd
SHA1c43a5025bdfd575b91de22f2d1ddbb89f7b43e33
SHA2564cd6af3518b6b5c4ab2562d0ca2497a0d3e07e0f1a96d7de1f2e84c5b4d1e06f
SHA512f55a41eae4463f6c9f559e8130e5fb73961a99af82b7c6bb360b202460898106d6fce8fcb02917f277b72cecf6b1f35f5d45fc8db2d10f816f8461f5a5f1766d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD535a28ef1fa185f851cf8c4441a19c6a1
SHA1b957e90f089bdbbe23c30721818e2d4baf217e0b
SHA256f6ea8efe439ab1d40b63a04c01159faab3ffd111c407b043aa656290ea0051b9
SHA5125ea66d40a26bcad3a92a6c292e45a060a7503a888f9475edbcede202402da3765eb66ef02eee308290be4fb5f9a9e6c78078d56d3eb6733fb145c6c90ebe46cd