Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe
Resource
win7-20240903-en
General
-
Target
582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe
-
Size
630KB
-
MD5
2f2be19e7df6549682b6db140841ef0c
-
SHA1
46b52ec65561265ed8936cbe1a4fdf417d87d629
-
SHA256
582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709
-
SHA512
9c4e87048ccd46ec60ac80a667384aa15b3dcf04ff5f8242918b1ebb9b9f8cb452c4d1f6d7c0712d8c90f0acc616d50a94cf448e28d8616e03f639e86192affc
-
SSDEEP
12288:+cTjvOn6nzxQkjZGhGZJd60sqQ0Om1lEWnBynQa44F8+19tNW3:Jj2n6n2ktGhGcVxyyMByQj4F8+19tw
Malware Config
Extracted
formbook
4.1
a03d
nfluencer-marketing-13524.bond
cebepu.info
lphatechblog.xyz
haoyun.website
itiz.xyz
orld-visa-center.online
si.art
alata.xyz
mmarketing.xyz
elnqdjc.shop
ensentoto.cloud
voyagu.info
onvert.today
1fuli9902.shop
otelhafnia.info
rumpchiefofstaff.store
urvivalflashlights.shop
0090.pizza
ings-hu-13.today
oliticalpatriot.net
5970.pizza
arimatch-in.legal
eepvid.xyz
bfootball.net
otorcycle-loans-19502.bond
nline-advertising-34790.bond
behm.info
aportsystems.store
agiararoma.net
agfov4u.xyz
9769.mobi
ome-renovation-86342.bond
kkkk.shop
duxrib.xyz
xurobo.info
leurdivin.online
ive-neurozoom.store
ndogaming.online
dj1.lat
yselection.xyz
52628.xyz
lsaadmart.store
oftware-download-92806.bond
avid-hildebrand.info
orashrine.store
erpangina-treatment-views.sbs
ategorie-polecane-831.buzz
oonlightshadow.shop
istromarmitaria.online
gmgslzdc.sbs
asglobalaz.shop
locarry.store
eleefmestreech.online
inggraphic.pro
atidiri.fun
olourclubbet.shop
eatbox.store
romatografia.online
encortex.beauty
8oosnny.xyz
72266.vip
aja168e.live
fath.shop
argloscaremedia.info
enelog.xyz
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2736-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2620-29-0x0000000000110000-0x000000000013F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2696 powershell.exe 2748 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2404 set thread context of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2736 set thread context of 1148 2736 MSBuild.exe 20 PID 2620 set thread context of 1148 2620 help.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 2696 powershell.exe 2748 powershell.exe 2736 MSBuild.exe 2736 MSBuild.exe 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe 2620 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2736 MSBuild.exe 2736 MSBuild.exe 2736 MSBuild.exe 2620 help.exe 2620 help.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2736 MSBuild.exe Token: SeDebugPrivilege 2620 help.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2696 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 31 PID 2404 wrote to memory of 2696 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 31 PID 2404 wrote to memory of 2696 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 31 PID 2404 wrote to memory of 2696 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 31 PID 2404 wrote to memory of 2748 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 33 PID 2404 wrote to memory of 2748 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 33 PID 2404 wrote to memory of 2748 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 33 PID 2404 wrote to memory of 2748 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 33 PID 2404 wrote to memory of 2832 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 34 PID 2404 wrote to memory of 2832 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 34 PID 2404 wrote to memory of 2832 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 34 PID 2404 wrote to memory of 2832 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 34 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 2404 wrote to memory of 2736 2404 582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe 37 PID 1148 wrote to memory of 2620 1148 Explorer.EXE 38 PID 1148 wrote to memory of 2620 1148 Explorer.EXE 38 PID 1148 wrote to memory of 2620 1148 Explorer.EXE 38 PID 1148 wrote to memory of 2620 1148 Explorer.EXE 38 PID 2620 wrote to memory of 268 2620 help.exe 39 PID 2620 wrote to memory of 268 2620 help.exe 39 PID 2620 wrote to memory of 268 2620 help.exe 39 PID 2620 wrote to memory of 268 2620 help.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe"C:\Users\Admin\AppData\Local\Temp\582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\582c078327541d1459228aebf38c9471b78e3a2c03cb9c375622209221970709.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TsSurBeHosk.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TsSurBeHosk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD54.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b6054202f081d94d7eb0c935d0f7c60b
SHA1390b82d21c83936d175629ab19e257355497e82a
SHA256cd8a7413829125c2e5f28f07ae7af5ab1bd59fd262660b89a37476033282b3ba
SHA512f0d0d34b92dbbf36bdb9d9afdeea70eca169c70bc694dd0ac57564b7d198d931a321ba165548407fe8b6c5f7913419fc1d41083109e4c60bff08cdb856bdfc2c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD543e466f872391db766cfe978c60addfc
SHA12de638b9f038fc5b8a2b0ea3c03c500555113e4e
SHA2566658655a28970a4386c0010a55ac032d9ff8f017dcf027dd3bee0636de070dbf
SHA512131e3bbf8899ca117f8880dd1d2e2383658e365bb4a94dcdadf922a2857b8ab41f91fe3cb6a983e66ff676afa68be48e7927df0e5f88dbc8f351e61cc07a11b5