Analysis
-
max time kernel
448s -
max time network
450s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
6086e2101717fd208b1f2b27d236d242.exe
Resource
win7-20240903-en
General
-
Target
6086e2101717fd208b1f2b27d236d242.exe
-
Size
586KB
-
MD5
6086e2101717fd208b1f2b27d236d242
-
SHA1
b47eb5dad7656f4ea4f520bffa2df5217c611efb
-
SHA256
712f4edfc3c0a1ad54060809bb9c39b0a1a355c8ebcb2cc377f100215a3f4150
-
SHA512
63a7e54bfc1693cb8e818fb95e843fa8b791ef07996073326c944b702dd53e1cafd794bc46611836311e5e2b057684cef06998a40647cd0ba09ff4ea3da2f96d
-
SSDEEP
12288:RfhpMHL/F+METLZNFKK/JFieyX7CXpCe9zJVGTP:gL/F+MEdV/JGrCXgeBJW
Malware Config
Extracted
formbook
4.1
mj25
resencepeople.net
okebowlkoning.online
owevrcast.store
ynursery.xyz
isefyxerprotech.info
nventrobots-br.xyz
rojetos3d.shop
confyxerengine.info
litdugunsalonu.xyz
uporexinaluvo.click
attwecan.net
r154359.xyz
airtidy.store
headvancestore.shop
urolube.xyz
apnovis.online
adychef.shop
armhouse.world
unspotgambit.top
nline-dating-for-now.today
cicoon.live
602vuvetyy.pro
cdx4.site
ficonta.academy
riceradargeniusnow.xyz
43jknf137r.shop
rackyourbestofferinstantly.xyz
entors.services
etworktechnoki.pro
oelsharon.online
ecksbadgirls.net
dsigngroup.net
luffychao.online
oxgoblin.net
irtuousdesigns.net
fjjrrgc.shop
avabet168.london
rampedc.store
axpnqq.business
ythought.online
ogel.ltd
ebwcn.shop
16mb.top
ysnova.online
hejhls.top
uanyang.store
implyoganicbeautyl.shop
obatopup.store
uturelumen.net
yyjdrtcee.xyz
ioace-it.net
usthavelist.app
ephagallery.online
ggbj.top
ilmeonlibe.online
xbet-pxd.top
ezpravru10.top
eb3aipop.top
omfycoffeecorner.site
rtxcd.xyz
rok3.mobi
cientific-ethics.online
aa576ev5.top
gobpb.top
xploreshipscienceteam.info
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4700-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4828 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 6086e2101717fd208b1f2b27d236d242.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3656 set thread context of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6086e2101717fd208b1f2b27d236d242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4700 6086e2101717fd208b1f2b27d236d242.exe 4700 6086e2101717fd208b1f2b27d236d242.exe 4828 powershell.exe 4828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4828 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3656 wrote to memory of 4828 3656 6086e2101717fd208b1f2b27d236d242.exe 96 PID 3656 wrote to memory of 4828 3656 6086e2101717fd208b1f2b27d236d242.exe 96 PID 3656 wrote to memory of 4828 3656 6086e2101717fd208b1f2b27d236d242.exe 96 PID 3656 wrote to memory of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98 PID 3656 wrote to memory of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98 PID 3656 wrote to memory of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98 PID 3656 wrote to memory of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98 PID 3656 wrote to memory of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98 PID 3656 wrote to memory of 4700 3656 6086e2101717fd208b1f2b27d236d242.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"C:\Users\Admin\AppData\Local\Temp\6086e2101717fd208b1f2b27d236d242.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82