Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 04:44
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20240903-en
General
-
Target
INQUIRY.exe
-
Size
689KB
-
MD5
f12960960ffcf4c9765daac91377f126
-
SHA1
42dd3f85af33aaed082b9cfc53aae76fdc39e418
-
SHA256
c52f08e31d55081182366aa8a2a1dde48d8e78f7cdd079fda0d64350dd7162b2
-
SHA512
36eede9c13894860363fe81496613529696df757f01d38eb133122cf1026d2901784ad9c2aeffd034136d60067467f9c1c8da0f1c473618cd1e5bda3b23acc42
-
SSDEEP
12288:kBX/UcCRbiJIAhoA9MxoBQVl0gRHDx5GYGB6K4s5ZW+tWpAHmuG3GkAr9RrQ2/:kNY4IAereEl0gRHDxcYio2WcYuGgr
Malware Config
Extracted
formbook
4.1
aw63
moothwolf.zone
remier-rgv.net
lwfff.fun
ater-leak-4321.click
osyalguzelanadolum.online
ifqyqhc.xyz
fos.center
cciqrdi.xyz
all-center-78598.bond
jcgpmif.xyz
ionttogell.net
58kpwm906r.shop
ook-therapy.net
emenbergcsp.net
ortexioner.digital
ztidqn.info
hazhai.lol
rofood.biz
unzhuo.cfd
r-outsourcing-64055.bond
ortsaintlucieroofing.net
yokbakar69.sbs
uderraad.net
awn-mower-21123.bond
g19kps.top
simnyio.xyz
ogical.biz
1903.loan
ool77.pro
oachworking.club
plicacion-mercadolibre.online
enior-dating-91173.bond
extengine.info
mprestimos-br.today
nuragyadav.tech
inematography-course-20204.bond
ryptobubbes.net
ofri.online
ustainableheatpump86.today
eddingssparklesworld.beauty
fvneoql.xyz
dr89f5.xyz
gmi120fps.fun
larmclock.top
ovelva.top
lowersbyyomiris.net
onversionboosttrack.xyz
uiyo.net
vn0.xyz
20plus.online
erabit.studio
lishaskinskiy.top
recisiongolfgear.shop
semaaiilinagency.biz
lay-venom-quest.xyz
ecurity-jobs-preferred.world
houreng.lol
heezii.world
ob-offer-60863.bond
ottery.coupons
civiantech.net
uckyspingenting55.shop
ranchizebz.today
ubshop.today
ydiyshed.net
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3580-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3580-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3596-22-0x0000000000520000-0x000000000054F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4680 set thread context of 3580 4680 INQUIRY.exe 93 PID 3580 set thread context of 3424 3580 INQUIRY.exe 56 PID 3596 set thread context of 3424 3596 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INQUIRY.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3580 INQUIRY.exe 3580 INQUIRY.exe 3580 INQUIRY.exe 3580 INQUIRY.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe 3596 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3580 INQUIRY.exe 3580 INQUIRY.exe 3580 INQUIRY.exe 3596 cmmon32.exe 3596 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3580 INQUIRY.exe Token: SeDebugPrivilege 3596 cmmon32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3424 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3580 4680 INQUIRY.exe 93 PID 4680 wrote to memory of 3580 4680 INQUIRY.exe 93 PID 4680 wrote to memory of 3580 4680 INQUIRY.exe 93 PID 4680 wrote to memory of 3580 4680 INQUIRY.exe 93 PID 4680 wrote to memory of 3580 4680 INQUIRY.exe 93 PID 4680 wrote to memory of 3580 4680 INQUIRY.exe 93 PID 3424 wrote to memory of 3596 3424 Explorer.EXE 94 PID 3424 wrote to memory of 3596 3424 Explorer.EXE 94 PID 3424 wrote to memory of 3596 3424 Explorer.EXE 94 PID 3596 wrote to memory of 3328 3596 cmmon32.exe 95 PID 3596 wrote to memory of 3328 3596 cmmon32.exe 95 PID 3596 wrote to memory of 3328 3596 cmmon32.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-