Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
rNew_PO178391922RFQAmended.exe
Resource
win7-20241023-en
General
-
Target
rNew_PO178391922RFQAmended.exe
-
Size
1.0MB
-
MD5
6af2e8d3a281642512d1dfc59619f83c
-
SHA1
7a4fe8bfa3c98873a8d73e2b8054aac34d42f448
-
SHA256
68812ea5d94f9af1fab9e3b3241390fb7404a4107bf610ca7ba21678cf500d46
-
SHA512
af2c82e5953be56c3bf020d463f216b7b4ccab1495bfa87a1ab56b31f98bd78c6417793ad8954e974cd2a3a658d1d9cef2a54d47249c01af7f27cbdb25e46598
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Fa2XWR43fLDfYER/bdGWY:su0c++OCvkGs9Fa2Xq43fffbjY
Malware Config
Extracted
formbook
4.1
ts49
aytolljqp.vip
ibnllc.net
impiezasvalladolid.net
reteon.xyz
edeliva.net
qynja.top
eometricdesigns.shop
64784p6.top
odhipoteke.online
ilezjan.net
om-dt02.cyou
xoticgirldrip.net
2livegames.live
ona88.skin
enerator-bcq.xyz
hared-office-4198379.zone
uyer.net
pilirplink.fun
t38asc.net
ntalyaescortking.site
aulinien.studio
atch-making.fun
inidnarenartp.autos
nxivki.digital
athryncarter.art
s-slay-slay.shop
grexiuy.xyz
fwsafuyfwq-fwqhufwqhfw.icu
tylescanner.vip
hot.pro
axfcw.top
xpr.net
ookinghealth.online
novifo.top
hn6.vip
s-sugardumplinkids.shop
ckdv.net
ykerconfg.info
18y6s10s.top
emoeuro.xyz
001.app
nlockpremiumquotemail.xyz
s94ngz.pro
terpsofcjzcf.life
adnames.art
xoticgirldrip.net
enbou-memberpage.net
enjandbeth.site
64gy.top
heseareafew.net
gsfxqt.top
ealfyxerlink.info
pmgo.net
provados.shop
uadapack.net
igua.one
ackomania.website
13b.xyz
eetfyxerworks.info
oranrbenedek.store
ersinfiltro.store
romanagementpro.pro
rojectdigitalkn.info
h0onueu.top
jxhttlgbx.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2380-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2380-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3048-17-0x00000000000C0000-0x00000000000EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2600 set thread context of 2380 2600 rNew_PO178391922RFQAmended.exe 30 PID 2380 set thread context of 1208 2380 svchost.exe 21 PID 3048 set thread context of 1208 3048 NAPSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rNew_PO178391922RFQAmended.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2380 svchost.exe 2380 svchost.exe 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2600 rNew_PO178391922RFQAmended.exe 2380 svchost.exe 2380 svchost.exe 2380 svchost.exe 3048 NAPSTAT.EXE 3048 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2380 svchost.exe Token: SeDebugPrivilege 3048 NAPSTAT.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2600 rNew_PO178391922RFQAmended.exe 2600 rNew_PO178391922RFQAmended.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2600 rNew_PO178391922RFQAmended.exe 2600 rNew_PO178391922RFQAmended.exe 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2380 2600 rNew_PO178391922RFQAmended.exe 30 PID 2600 wrote to memory of 2380 2600 rNew_PO178391922RFQAmended.exe 30 PID 2600 wrote to memory of 2380 2600 rNew_PO178391922RFQAmended.exe 30 PID 2600 wrote to memory of 2380 2600 rNew_PO178391922RFQAmended.exe 30 PID 2600 wrote to memory of 2380 2600 rNew_PO178391922RFQAmended.exe 30 PID 1208 wrote to memory of 3048 1208 Explorer.EXE 31 PID 1208 wrote to memory of 3048 1208 Explorer.EXE 31 PID 1208 wrote to memory of 3048 1208 Explorer.EXE 31 PID 1208 wrote to memory of 3048 1208 Explorer.EXE 31 PID 3048 wrote to memory of 2108 3048 NAPSTAT.EXE 32 PID 3048 wrote to memory of 2108 3048 NAPSTAT.EXE 32 PID 3048 wrote to memory of 2108 3048 NAPSTAT.EXE 32 PID 3048 wrote to memory of 2108 3048 NAPSTAT.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\rNew_PO178391922RFQAmended.exe"C:\Users\Admin\AppData\Local\Temp\rNew_PO178391922RFQAmended.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\rNew_PO178391922RFQAmended.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-