Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 04:44
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20240903-en
General
-
Target
INQUIRY.exe
-
Size
689KB
-
MD5
f12960960ffcf4c9765daac91377f126
-
SHA1
42dd3f85af33aaed082b9cfc53aae76fdc39e418
-
SHA256
c52f08e31d55081182366aa8a2a1dde48d8e78f7cdd079fda0d64350dd7162b2
-
SHA512
36eede9c13894860363fe81496613529696df757f01d38eb133122cf1026d2901784ad9c2aeffd034136d60067467f9c1c8da0f1c473618cd1e5bda3b23acc42
-
SSDEEP
12288:kBX/UcCRbiJIAhoA9MxoBQVl0gRHDx5GYGB6K4s5ZW+tWpAHmuG3GkAr9RrQ2/:kNY4IAereEl0gRHDxcYio2WcYuGgr
Malware Config
Extracted
formbook
4.1
aw63
moothwolf.zone
remier-rgv.net
lwfff.fun
ater-leak-4321.click
osyalguzelanadolum.online
ifqyqhc.xyz
fos.center
cciqrdi.xyz
all-center-78598.bond
jcgpmif.xyz
ionttogell.net
58kpwm906r.shop
ook-therapy.net
emenbergcsp.net
ortexioner.digital
ztidqn.info
hazhai.lol
rofood.biz
unzhuo.cfd
r-outsourcing-64055.bond
ortsaintlucieroofing.net
yokbakar69.sbs
uderraad.net
awn-mower-21123.bond
g19kps.top
simnyio.xyz
ogical.biz
1903.loan
ool77.pro
oachworking.club
plicacion-mercadolibre.online
enior-dating-91173.bond
extengine.info
mprestimos-br.today
nuragyadav.tech
inematography-course-20204.bond
ryptobubbes.net
ofri.online
ustainableheatpump86.today
eddingssparklesworld.beauty
fvneoql.xyz
dr89f5.xyz
gmi120fps.fun
larmclock.top
ovelva.top
lowersbyyomiris.net
onversionboosttrack.xyz
uiyo.net
vn0.xyz
20plus.online
erabit.studio
lishaskinskiy.top
recisiongolfgear.shop
semaaiilinagency.biz
lay-venom-quest.xyz
ecurity-jobs-preferred.world
houreng.lol
heezii.world
ob-offer-60863.bond
ottery.coupons
civiantech.net
uckyspingenting55.shop
ranchizebz.today
ubshop.today
ydiyshed.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2568-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2568-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2620-21-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2524 set thread context of 2568 2524 INQUIRY.exe 31 PID 2568 set thread context of 1192 2568 INQUIRY.exe 21 PID 2620 set thread context of 1192 2620 NAPSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INQUIRY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2568 INQUIRY.exe 2568 INQUIRY.exe 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2568 INQUIRY.exe 2568 INQUIRY.exe 2568 INQUIRY.exe 2620 NAPSTAT.EXE 2620 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2568 INQUIRY.exe Token: SeDebugPrivilege 2620 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 2524 wrote to memory of 2568 2524 INQUIRY.exe 31 PID 1192 wrote to memory of 2620 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2620 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2620 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2620 1192 Explorer.EXE 32 PID 2620 wrote to memory of 2768 2620 NAPSTAT.EXE 33 PID 2620 wrote to memory of 2768 2620 NAPSTAT.EXE 33 PID 2620 wrote to memory of 2768 2620 NAPSTAT.EXE 33 PID 2620 wrote to memory of 2768 2620 NAPSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
-