Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 02:33
Static task
static1
Behavioral task
behavioral1
Sample
467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe
Resource
win7-20241023-en
General
-
Target
467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe
-
Size
651KB
-
MD5
9ecbdf4d5174c3da835a2a7829e06773
-
SHA1
734529d1583291a87ff3cfc8895705e374f0091a
-
SHA256
467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7
-
SHA512
06ce5f9f79ed67731552a64fd4d730512cf10a1b006d3b4e258f357f85d8288e1c8862e4f2e8460ee58ef6ec138ae68b161372443c5091dfb4460f584fb49317
-
SSDEEP
12288:djz40GsIZC+9koIrfqUe1FOB/Uy4d8+1Aeh1bWwU6RnPsdx90:m3GXoIBe1FOf4dOCnPs
Malware Config
Extracted
formbook
4.1
b02a
nnovate.host
yrvo.shop
obify.party
55665.one
vlisazouasiul.store
arjohbs.shop
mjsccc5716.shop
nfluencer-marketing-86606.bond
atellite-internet-74549.bond
arehouse-inventory-82506.bond
kanzaturf.net
airbypatrickmcguire.net
90880a15.buzz
ancake888.info
hopcroma.store
usinessloanscanada524285.icu
mdjr.world
9kct.xyz
ombrd.finance
luratu.xyz
commerce-97292.bond
ovies4u-hd.online
zmi.info
ealth-insurance-63745.bond
rypto-god.online
ustdesk.email
talezoom.asia
haf.international
heaterscm.net
rejo.info
nitedstatesofart.net
ental-implants-29843.bond
uzzleworld.xyz
fg0m9c0lk.cyou
emospin30.info
ocejo.africa
aqiwang.net
vgtdvchvmdsvmdhbvgv.pro
ymtech.digital
ok-vi.sbs
u5kt.net
heoneglobal.store
78158.legal
argloscaremedia.info
ailylife.pro
nfotj.live
obistores.online
irofprague.net
mpteamtoto88.today
rmap.xyz
zliving.xyz
ubesafari.video
aylee.blue
ery.rocks
udioevideo.store
oneymachine.show
885522a0.shop
oodchoices.xyz
ilano.shop
vikadi.info
ecoramay.store
kit.run
ookinguptolightup.net
ndata.net
ubbs.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2920-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2772-28-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2464 powershell.exe 3064 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1236 set thread context of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 2920 set thread context of 1188 2920 RegSvcs.exe 21 PID 2772 set thread context of 1188 2772 NETSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2772 NETSTAT.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 2920 RegSvcs.exe 2464 powershell.exe 3064 powershell.exe 2920 RegSvcs.exe 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE 2772 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2920 RegSvcs.exe 2920 RegSvcs.exe 2920 RegSvcs.exe 2772 NETSTAT.EXE 2772 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 2920 RegSvcs.exe Token: SeDebugPrivilege 2772 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2464 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 31 PID 1236 wrote to memory of 2464 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 31 PID 1236 wrote to memory of 2464 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 31 PID 1236 wrote to memory of 2464 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 31 PID 1236 wrote to memory of 3064 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 33 PID 1236 wrote to memory of 3064 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 33 PID 1236 wrote to memory of 3064 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 33 PID 1236 wrote to memory of 3064 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 33 PID 1236 wrote to memory of 2744 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 35 PID 1236 wrote to memory of 2744 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 35 PID 1236 wrote to memory of 2744 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 35 PID 1236 wrote to memory of 2744 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 35 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1236 wrote to memory of 2920 1236 467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe 37 PID 1188 wrote to memory of 2772 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2772 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2772 1188 Explorer.EXE 38 PID 1188 wrote to memory of 2772 1188 Explorer.EXE 38 PID 2772 wrote to memory of 2476 2772 NETSTAT.EXE 39 PID 2772 wrote to memory of 2476 2772 NETSTAT.EXE 39 PID 2772 wrote to memory of 2476 2772 NETSTAT.EXE 39 PID 2772 wrote to memory of 2476 2772 NETSTAT.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe"C:\Users\Admin\AppData\Local\Temp\467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\467d77d35a6fc815ecbd60b0b320d7ca06e0f8a340c2c3285de4c0430517f8e7.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zykAUGFBtng.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zykAUGFBtng" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF9E9.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cf2f4dea160d2d0042e25d2e52fa7ed5
SHA183bfcd3dfd60094db8232a2c186cf098d23e3813
SHA2564f552be8fe5b4e4ab19e7c3226d39967192c171cfe8a7982d869657a95261fa9
SHA512c35a0c43247f51e97ef1896b4523de633c810d4acfaa0b1308a34e35fe5b49a9670dacc9822dfe99570a5f122fdfb4965baca53528a12816682d73d50b8ce81d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9FF677SU75YYCAE3YU5C.temp
Filesize7KB
MD50c7ccb770b249d02476ae29055c04e61
SHA18e53ca1d88be22693e30ee8b5f03c3d0c91cfbcf
SHA256fc6d1a4cc3b11143be72bc71a92d93aa215f9549ccf3d4d64ea1a13c4e07851b
SHA512cdd9b7c7e21124adc982d096ad0dacb67a638399728d64bd53a916a218580222ff2a8c381b4cc3eb4e899eff19d89c6cbb0bdba56d2d2a099033128786233d4e