Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 04:29
Static task
static1
Behavioral task
behavioral1
Sample
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe
Resource
win7-20240903-en
General
-
Target
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe
-
Size
736KB
-
MD5
a38bf0cb849b74859811215bf7b38129
-
SHA1
8c74dd2e056a8f1d0d3051c3815ef8a5ff213e83
-
SHA256
9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46
-
SHA512
46a44e51f67ca609c814e43ff304eabacb1de5f86347656871026185e2c971abce9496bfa6fb0aba176bc7b17eb3ff20c76411f6911894de3edaadf44145e115
-
SSDEEP
12288:sKOlbxrk0IO8DfSbK9OMiKkh5Ur02lGnhp5VtERFL6cnmGsOBWahIvuI0zNLn:1/fZoMiKkor0Fhdt2XnmfKWaGvdgLn
Malware Config
Extracted
formbook
4.1
egs9
alliancecigars.net
35893.pizza
selidik.cloud
evel789-aman.club
wqsbr5jc.vip
corretoraplanodesaude.shop
balikoltada.xyz
play-vanguard-nirvana.xyz
paktuaslotxcxrtp.xyz
retailzone1997.shop
jk77juta-official.cloud
godmoments.app
flippinforbidsfrear.cloud
234bets.net
cryptobiz.tech
construction-jobs-50157.bond
cuficdarbiesdarleen.cloud
t59bm675ri.skin
ondqwxl.top
kpde.xyz
apoiador.xyz
denotational.xyz
fat-removal-40622.bond
kqsamcsauqiagmma.xyz
online-advertising-68283.bond
mise96.xyz
pokerdom55.vip
arai.rest
marketplace20.click
kongou.systems
isbnu.shop
online-advertising-98154.bond
pepsico.llc
80072661.xyz
wholesalemeat.today
security-apps-16796.bond
remationservices26114.shop
kitchen-remodeling-14279.bond
betterskin.store
aigamestudio.xyz
uhsrgi.info
mentagekript.today
box-spring-bed-50031.bond
blood-flow.bond
653emd.top
venturelinks.net
trendysolutions.store
creativege.xyz
sellhome.live
petir99bro.xyz
maipingxiu.net
influencer-marketing-56510.bond
czlovesys.xyz
phpcrazy.net
hikingk.store
imstest.online
bet2024.shop
lord.land
gobg.net
armada77x.sbs
msytuv.info
buenosbufidinburez.cloud
transeo.xyz
deltaestates.online
redgoodsgather.shop
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/796-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2396-23-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2936 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2720 set thread context of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 796 set thread context of 1184 796 RegSvcs.exe 21 PID 2396 set thread context of 1184 2396 msdt.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 796 RegSvcs.exe 796 RegSvcs.exe 2936 powershell.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe 2396 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 796 RegSvcs.exe 796 RegSvcs.exe 796 RegSvcs.exe 2396 msdt.exe 2396 msdt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe Token: SeDebugPrivilege 796 RegSvcs.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 2396 msdt.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2936 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 30 PID 2720 wrote to memory of 2936 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 30 PID 2720 wrote to memory of 2936 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 30 PID 2720 wrote to memory of 2936 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 30 PID 2720 wrote to memory of 2916 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 31 PID 2720 wrote to memory of 2916 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 31 PID 2720 wrote to memory of 2916 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 31 PID 2720 wrote to memory of 2916 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 31 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 2720 wrote to memory of 796 2720 9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe 34 PID 1184 wrote to memory of 2396 1184 Explorer.EXE 35 PID 1184 wrote to memory of 2396 1184 Explorer.EXE 35 PID 1184 wrote to memory of 2396 1184 Explorer.EXE 35 PID 1184 wrote to memory of 2396 1184 Explorer.EXE 35 PID 2396 wrote to memory of 2604 2396 msdt.exe 36 PID 2396 wrote to memory of 2604 2396 msdt.exe 36 PID 2396 wrote to memory of 2604 2396 msdt.exe 36 PID 2396 wrote to memory of 2604 2396 msdt.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe"C:\Users\Admin\AppData\Local\Temp\9091fdbec2a3257c13d8d0d92662d028912443c174a3d80c86373262076b5d46.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FfayxLkyvAcR.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FfayxLkyvAcR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2CBB.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b0ed4cf3783cdeba2f9ea16899da463
SHA106e373d1574f3a5ff414ca4847d2edc98b0e2a90
SHA2565412b1b0be4e8f67b0446dcf5e7b1070e2ede2113699b7f0b44b409b388da7c5
SHA512d8a1a74cd0a46471027f4069910dcec22f3bd4957b915fbbf21fdc45286a07a039119f88e54861ede0ca03b9b4d294b40cb7a202ed47a148db04f70433d0de08