Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 04:02
Static task
static1
Behavioral task
behavioral1
Sample
6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe
Resource
win7-20240903-en
General
-
Target
6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe
-
Size
741KB
-
MD5
034884d1de2c2e61a49d403a6673118c
-
SHA1
4106f0fe2e8504f0f71cc012ecb992b63cb0792b
-
SHA256
6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c
-
SHA512
3a751cde89e771defecd23a1fda44c219df59bca611daebd8be29985071e0e5d5f15f983306afc9b468c92e2bbb96c4b6438ae23fbe896927cf47c29c72037b7
-
SSDEEP
12288:2q7kGLFFgETr/iTTbB6xddbQT+wwOXgMSQejYO6YmDDI01jnIltQLZEK:l3rKGHbQlSQ/GmDt1jnRj
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/1700-25-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1700-28-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/876-31-0x0000000000070000-0x000000000009F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2760 powershell.exe 2772 powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2400 set thread context of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 1700 set thread context of 1248 1700 RegSvcs.exe 21 PID 1700 set thread context of 1248 1700 RegSvcs.exe 21 PID 876 set thread context of 1248 876 cscript.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 2772 powershell.exe 2760 powershell.exe 1700 RegSvcs.exe 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 1700 RegSvcs.exe 1700 RegSvcs.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe 876 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1700 RegSvcs.exe 1700 RegSvcs.exe 1700 RegSvcs.exe 1700 RegSvcs.exe 876 cscript.exe 876 cscript.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe Token: SeDebugPrivilege 2772 powershell.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 1700 RegSvcs.exe Token: SeDebugPrivilege 876 cscript.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2760 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 31 PID 2400 wrote to memory of 2760 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 31 PID 2400 wrote to memory of 2760 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 31 PID 2400 wrote to memory of 2760 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 31 PID 2400 wrote to memory of 2772 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 33 PID 2400 wrote to memory of 2772 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 33 PID 2400 wrote to memory of 2772 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 33 PID 2400 wrote to memory of 2772 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 33 PID 2400 wrote to memory of 2948 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 34 PID 2400 wrote to memory of 2948 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 34 PID 2400 wrote to memory of 2948 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 34 PID 2400 wrote to memory of 2948 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 34 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 2400 wrote to memory of 1700 2400 6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe 37 PID 1248 wrote to memory of 876 1248 Explorer.EXE 38 PID 1248 wrote to memory of 876 1248 Explorer.EXE 38 PID 1248 wrote to memory of 876 1248 Explorer.EXE 38 PID 1248 wrote to memory of 876 1248 Explorer.EXE 38 PID 876 wrote to memory of 1064 876 cscript.exe 39 PID 876 wrote to memory of 1064 876 cscript.exe 39 PID 876 wrote to memory of 1064 876 cscript.exe 39 PID 876 wrote to memory of 1064 876 cscript.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe"C:\Users\Admin\AppData\Local\Temp\6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\6f706398207b1fd3a00de5f859dc840cf8e100175fdabe260ebb96db5980f03c.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\fmIowyKo.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fmIowyKo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp81C.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d721d753faa9e1b21e0fe8923d43bb82
SHA1735f1267d6fe04e9a9e14e58475a74c6cfe3a14c
SHA256c99b47713a9d1919ebadcd4bdf1ba529b0f7c46c760b957f94588daf6b48a89a
SHA5125111cb602d277527810d0fd5805e24876d829e722dea4898d5bea0dfe4b74e56328b8982c90cf1784602d4760bd900fd517be9fa6794065eb3cebb0939306246
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NCHWV5LWO3XE5X9D43B7.temp
Filesize7KB
MD534f3ed40259bd671192b148e7a7875c0
SHA18f01a5f7fe568b103f0b9bd4228ef64baedd4ad4
SHA256f400f7d555cd732278298068ecd334704fe58fc35d5caf9c992e0846b40b8f76
SHA5120f02503f5f453d4ffdd771716a4e90a7e1a321884817907b8cf04ea30b86f4adbb201e1a92463da20bd507b11abcdcff828282ffcec5d30740af607b400131ed