Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
rNew_PO178391922RFQAmended.exe
Resource
win7-20241023-en
General
-
Target
rNew_PO178391922RFQAmended.exe
-
Size
1.0MB
-
MD5
6af2e8d3a281642512d1dfc59619f83c
-
SHA1
7a4fe8bfa3c98873a8d73e2b8054aac34d42f448
-
SHA256
68812ea5d94f9af1fab9e3b3241390fb7404a4107bf610ca7ba21678cf500d46
-
SHA512
af2c82e5953be56c3bf020d463f216b7b4ccab1495bfa87a1ab56b31f98bd78c6417793ad8954e974cd2a3a658d1d9cef2a54d47249c01af7f27cbdb25e46598
-
SSDEEP
24576:au6J33O0c+JY5UZ+XC0kGso6Fa2XWR43fLDfYER/bdGWY:su0c++OCvkGs9Fa2Xq43fffbjY
Malware Config
Extracted
formbook
4.1
ts49
aytolljqp.vip
ibnllc.net
impiezasvalladolid.net
reteon.xyz
edeliva.net
qynja.top
eometricdesigns.shop
64784p6.top
odhipoteke.online
ilezjan.net
om-dt02.cyou
xoticgirldrip.net
2livegames.live
ona88.skin
enerator-bcq.xyz
hared-office-4198379.zone
uyer.net
pilirplink.fun
t38asc.net
ntalyaescortking.site
aulinien.studio
atch-making.fun
inidnarenartp.autos
nxivki.digital
athryncarter.art
s-slay-slay.shop
grexiuy.xyz
fwsafuyfwq-fwqhufwqhfw.icu
tylescanner.vip
hot.pro
axfcw.top
xpr.net
ookinghealth.online
novifo.top
hn6.vip
s-sugardumplinkids.shop
ckdv.net
ykerconfg.info
18y6s10s.top
emoeuro.xyz
001.app
nlockpremiumquotemail.xyz
s94ngz.pro
terpsofcjzcf.life
adnames.art
xoticgirldrip.net
enbou-memberpage.net
enjandbeth.site
64gy.top
heseareafew.net
gsfxqt.top
ealfyxerlink.info
pmgo.net
provados.shop
uadapack.net
igua.one
ackomania.website
13b.xyz
eetfyxerworks.info
oranrbenedek.store
ersinfiltro.store
romanagementpro.pro
rojectdigitalkn.info
h0onueu.top
jxhttlgbx.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4972-7-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4972-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2464-16-0x00000000012A0000-0x00000000012CF000-memory.dmp formbook -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4352-6-0x0000000000E10000-0x0000000001210000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4352 set thread context of 4972 4352 rNew_PO178391922RFQAmended.exe 90 PID 4972 set thread context of 3512 4972 svchost.exe 56 PID 2464 set thread context of 3512 2464 svchost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rNew_PO178391922RFQAmended.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4972 svchost.exe 4972 svchost.exe 4972 svchost.exe 4972 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe 2464 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4352 rNew_PO178391922RFQAmended.exe 4972 svchost.exe 4972 svchost.exe 4972 svchost.exe 2464 svchost.exe 2464 svchost.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4972 svchost.exe Token: SeDebugPrivilege 2464 svchost.exe Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE Token: SeShutdownPrivilege 3512 Explorer.EXE Token: SeCreatePagefilePrivilege 3512 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4352 rNew_PO178391922RFQAmended.exe 4352 rNew_PO178391922RFQAmended.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4352 rNew_PO178391922RFQAmended.exe 4352 rNew_PO178391922RFQAmended.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3512 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4972 4352 rNew_PO178391922RFQAmended.exe 90 PID 4352 wrote to memory of 4972 4352 rNew_PO178391922RFQAmended.exe 90 PID 4352 wrote to memory of 4972 4352 rNew_PO178391922RFQAmended.exe 90 PID 4352 wrote to memory of 4972 4352 rNew_PO178391922RFQAmended.exe 90 PID 3512 wrote to memory of 2464 3512 Explorer.EXE 91 PID 3512 wrote to memory of 2464 3512 Explorer.EXE 91 PID 3512 wrote to memory of 2464 3512 Explorer.EXE 91 PID 2464 wrote to memory of 3592 2464 svchost.exe 92 PID 2464 wrote to memory of 3592 2464 svchost.exe 92 PID 2464 wrote to memory of 3592 2464 svchost.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\rNew_PO178391922RFQAmended.exe"C:\Users\Admin\AppData\Local\Temp\rNew_PO178391922RFQAmended.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\rNew_PO178391922RFQAmended.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-