Analysis
-
max time kernel
269s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 10:36
Static task
static1
Behavioral task
behavioral1
Sample
Final Approved PO.scr
Resource
win7-20240729-en
General
-
Target
Final Approved PO.scr
-
Size
736KB
-
MD5
92f57354478728b4b1982d2acfe79393
-
SHA1
5d8dde6e098981b329149bd0b87eb42baab32b32
-
SHA256
59985a17d6de339280dfdbbd0ab6399e8f9f736de109d41feea5b5f4f46f81f0
-
SHA512
6c7d00322951dd459f77cd27ae449c46d65b9e88b85b0df2b3c745a4bbe7ef0562a17e620dda84d4366e71936131a5214c7dd81eb1714dff86cb654e27c2d28b
-
SSDEEP
12288:E5/6/hRSUun6oxsGv7dgTnvtHOUL2zoVbpig9GrghiAExkR:c6On627dgTn1BCzoVFig9GrUiAEs
Malware Config
Extracted
formbook
4.1
g43m
8328.shop
kronoseletronicos.online
pasanghoki3.homes
comitatogroscavallo.info
online-advertising-96729.bond
cpt1025.top
news-xzurufo.xyz
zycr.shop
loanplan.xyz
osipovs.digital
pgflow.cloud
alooytv17.shop
swirlstakedtawkee.cloud
sipoja.shop
senior-living-17169.bond
junepages.online
heavydutyweld.shop
smarminds.xyz
alistika.info
staplerl.shop
engagementrings-ar-271129.today
contract-jobs-82251.bond
lawnwonder.store
influencer-marketing-24346.bond
bujangjp-gtm.xyz
liberateyoursoul.net
fyw.info
917183.club
roamer.social
make-money-online-55635.bond
growing.digital
esperanza.live
71401.shop
jiuse1889.xyz
wvyzvej7f.xyz
msdvo45e.top
euweb.shop
wq9915.cyou
auslift.equipment
rumseysabinsargos.cloud
939951.xyz
yugen4dno1.art
glovesforboxes.shop
kruzhka-tut.online
whisps.cloud
ytmp3.town
exusintelligence.xyz
dental-implants-26269.bond
oncasino.xyz
home-remodeling-54747.bond
t7wghnrpj3c6m.buzz
vxgjhgbx.top
eepthought.social
bakalaomemeapps.xyz
spotifyi.vip
j0g8d.skin
xxtoexy001.sbs
dnregistry.net
mlrgarments.net
gmn089.top
qpb5vwhgmlfapfka.cyou
chicprotect.shop
hjrdz.xyz
hwamk91b7bgpkjob.xyz
astral.directory
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4620-22-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4620-30-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4620-96-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2588-98-0x0000000001040000-0x000000000106F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4404 powershell.exe 232 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Final Approved PO.scr -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4376 set thread context of 4620 4376 Final Approved PO.scr 95 PID 4620 set thread context of 3392 4620 RegSvcs.exe 56 PID 4620 set thread context of 3392 4620 RegSvcs.exe 56 PID 2588 set thread context of 3392 2588 msdt.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Final Approved PO.scr -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 Final Approved PO.scr 4376 Final Approved PO.scr 4376 Final Approved PO.scr 4376 Final Approved PO.scr 4376 Final Approved PO.scr 232 powershell.exe 4620 RegSvcs.exe 4620 RegSvcs.exe 4620 RegSvcs.exe 4620 RegSvcs.exe 4404 powershell.exe 4404 powershell.exe 232 powershell.exe 4620 RegSvcs.exe 4620 RegSvcs.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4620 RegSvcs.exe 4620 RegSvcs.exe 4620 RegSvcs.exe 4620 RegSvcs.exe 2588 msdt.exe 2588 msdt.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4376 Final Approved PO.scr Token: SeDebugPrivilege 4404 powershell.exe Token: SeDebugPrivilege 232 powershell.exe Token: SeDebugPrivilege 4620 RegSvcs.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeDebugPrivilege 2588 msdt.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4404 4376 Final Approved PO.scr 89 PID 4376 wrote to memory of 4404 4376 Final Approved PO.scr 89 PID 4376 wrote to memory of 4404 4376 Final Approved PO.scr 89 PID 4376 wrote to memory of 232 4376 Final Approved PO.scr 91 PID 4376 wrote to memory of 232 4376 Final Approved PO.scr 91 PID 4376 wrote to memory of 232 4376 Final Approved PO.scr 91 PID 4376 wrote to memory of 2024 4376 Final Approved PO.scr 93 PID 4376 wrote to memory of 2024 4376 Final Approved PO.scr 93 PID 4376 wrote to memory of 2024 4376 Final Approved PO.scr 93 PID 4376 wrote to memory of 4620 4376 Final Approved PO.scr 95 PID 4376 wrote to memory of 4620 4376 Final Approved PO.scr 95 PID 4376 wrote to memory of 4620 4376 Final Approved PO.scr 95 PID 4376 wrote to memory of 4620 4376 Final Approved PO.scr 95 PID 4376 wrote to memory of 4620 4376 Final Approved PO.scr 95 PID 4376 wrote to memory of 4620 4376 Final Approved PO.scr 95 PID 3392 wrote to memory of 2588 3392 Explorer.EXE 97 PID 3392 wrote to memory of 2588 3392 Explorer.EXE 97 PID 3392 wrote to memory of 2588 3392 Explorer.EXE 97 PID 2588 wrote to memory of 3024 2588 msdt.exe 99 PID 2588 wrote to memory of 3024 2588 msdt.exe 99 PID 2588 wrote to memory of 3024 2588 msdt.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Final Approved PO.scr"C:\Users\Admin\AppData\Local\Temp\Final Approved PO.scr" /S2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Final Approved PO.scr"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kCpsUhyCPjSiry.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kCpsUhyCPjSiry" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC35F.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2024
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2584
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5dc2bd5dab95abf141264259539321a24
SHA19ccc3fd07be0d92daeeae2fc3a5c4ff9d93c5c34
SHA2562c406a93c01d9e52e61ad1347f0433b837a3a27862c9fc40525eac5580ba2c3c
SHA512c14c4a0b84b153fa6a6823ad8406ef22dd7ccc242ad494cad7acbd02002f47c39bf91344b250f5bfc8d40abd4060f32e70bb6943c7c1be289beb39522341ec59
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD540adea8ec11d3d284ceecd203678a030
SHA1f46a502d17734775ab78ef654013df48ba629e36
SHA25678d646dd6a420b9fb92e8a8925d72c0afe2bc13ff8a33e51729a1f5c6572fe53
SHA512b62587a84a171c4639178568546f0841d2e59da974e8ad4ced652f972f2cb54f79f4c0934b74d5e3547d44b05925c2ec599f0880989a1f95b62f009d2042314b