Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2025, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
RWFkOB6dKcCEKNt.exe
Resource
win10v2004-20250314-en
General
-
Target
RWFkOB6dKcCEKNt.exe
-
Size
639KB
-
MD5
e338ac0420228d826826f9afdb49434d
-
SHA1
eb40be01001791cace6246c363fbb796fff61fc5
-
SHA256
9948ae75550edf04cbad0aa67a427908d5f5dd86bae12998ff9e4debfc28a645
-
SHA512
2b149ae5a53dd7dd4244553f2b3abe486397bde120c766765a6af07bc3dd1112c7f6821501b87e1c918fb8ac1b77cc7d21b7e46fa81535d2830d8af974d6dd84
-
SSDEEP
12288:0/yqIkwVZgZTprxD8yoEGhwVS7raZxhr0AnxzKqOnkkj+S6GjhXmN3i5kXw61GbR:gJIviZfTGhwVSHad4Anxz1GkkaSJIN34
Malware Config
Extracted
formbook
4.1
hi13
olidspot.shop
aise-your-voice.sbs
9ydygorig3l7z.xyz
netuzio.xyz
erspacehealthandwellness.info
hbnzk.cfd
uklor.shop
tudiofoti.pro
onety.skin
iralavinc.online
teelpath.shop
w-yudfjp.shop
betka.xyz
lx2cbhe5vee0e1.xyz
ndotoverf.pro
loud-sevice.click
enckubs.shop
anpack.shop
nity-3d-development.dev
iaolento12.sbs
xectgroup.net
avakey.shop
kfast.store
ayeewenvqzqm.top
66xq2.top
cvaultshielded.live
5zbm0.cfd
g1wszulqv7lc.xyz
rog.top
xplosion-proof.lat
aysec.net
999game.website
3a4p8gq8bojwn.xyz
x92q.top
akextow.net
t775.top
873013.xyz
tu1x120.top
9882aa1216.autos
ayarwarna21.live
ardengoal.net
8ln62.cfd
elvetvoiceskiresorts.website
kpqh.town
njjwh.info
movps.net
pb79kasy.vip
ellbar.shop
inktrim.xyz
hagrinleemotooltechus.shop
olayl
tp-batik77-1.vip
looring-services329769.sbs
130t.xyz
9gi02.cfd
elayrunway.shop
phones-br.sbs
aser-skin-treatment-95250.bond
ry-prodentims.shop
rtelegans.art
01411.club
it4n1ar4t0k7o0.xyz
igitalmilanolegacy.shop
ompanion.bio
gsp657.top
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/4576-46-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/4576-91-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1908-93-0x0000000000A20000-0x0000000000A4F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5376 powershell.exe 4916 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation RWFkOB6dKcCEKNt.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4360 set thread context of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 4576 set thread context of 3420 4576 vbc.exe 56 PID 4576 set thread context of 3420 4576 vbc.exe 56 PID 1908 set thread context of 3420 1908 NETSTAT.EXE 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RWFkOB6dKcCEKNt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1908 NETSTAT.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4360 RWFkOB6dKcCEKNt.exe 4916 powershell.exe 5376 powershell.exe 4916 powershell.exe 4360 RWFkOB6dKcCEKNt.exe 4576 vbc.exe 4576 vbc.exe 4576 vbc.exe 4576 vbc.exe 5376 powershell.exe 4576 vbc.exe 4576 vbc.exe 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE 1908 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3420 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4576 vbc.exe 4576 vbc.exe 4576 vbc.exe 4576 vbc.exe 1908 NETSTAT.EXE 1908 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4360 RWFkOB6dKcCEKNt.exe Token: SeDebugPrivilege 4916 powershell.exe Token: SeDebugPrivilege 5376 powershell.exe Token: SeDebugPrivilege 4576 vbc.exe Token: SeShutdownPrivilege 3420 Explorer.EXE Token: SeCreatePagefilePrivilege 3420 Explorer.EXE Token: SeShutdownPrivilege 3420 Explorer.EXE Token: SeCreatePagefilePrivilege 3420 Explorer.EXE Token: SeDebugPrivilege 1908 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3420 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4916 4360 RWFkOB6dKcCEKNt.exe 94 PID 4360 wrote to memory of 4916 4360 RWFkOB6dKcCEKNt.exe 94 PID 4360 wrote to memory of 4916 4360 RWFkOB6dKcCEKNt.exe 94 PID 4360 wrote to memory of 5376 4360 RWFkOB6dKcCEKNt.exe 96 PID 4360 wrote to memory of 5376 4360 RWFkOB6dKcCEKNt.exe 96 PID 4360 wrote to memory of 5376 4360 RWFkOB6dKcCEKNt.exe 96 PID 4360 wrote to memory of 4080 4360 RWFkOB6dKcCEKNt.exe 98 PID 4360 wrote to memory of 4080 4360 RWFkOB6dKcCEKNt.exe 98 PID 4360 wrote to memory of 4080 4360 RWFkOB6dKcCEKNt.exe 98 PID 4360 wrote to memory of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 4360 wrote to memory of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 4360 wrote to memory of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 4360 wrote to memory of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 4360 wrote to memory of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 4360 wrote to memory of 4576 4360 RWFkOB6dKcCEKNt.exe 100 PID 3420 wrote to memory of 1908 3420 Explorer.EXE 101 PID 3420 wrote to memory of 1908 3420 Explorer.EXE 101 PID 3420 wrote to memory of 1908 3420 Explorer.EXE 101 PID 1908 wrote to memory of 744 1908 NETSTAT.EXE 102 PID 1908 wrote to memory of 744 1908 NETSTAT.EXE 102 PID 1908 wrote to memory of 744 1908 NETSTAT.EXE 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\RWFkOB6dKcCEKNt.exe"C:\Users\Admin\AppData\Local\Temp\RWFkOB6dKcCEKNt.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RWFkOB6dKcCEKNt.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bbehmlw.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5376
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bbehmlw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9683.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4080
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5f475a75fabca50ffaf07a5ffb3b520c0
SHA18a06afc142f19a7a1cc47b779274594fb3a3e128
SHA2562a747204bc78d78ecd5ec2420a42c8de37a5fb43ec0398f7e38ccfc2faa6b88e
SHA512aa3d8325c142223c93d40d9e7f596dd85b2779018ecd5ad38c44b78721f57ff3652f6d68e6b3a833163deabc446cc93fb17cfe908dcc9fa5e3e6f86f92b1877b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ae5db7d70f7a70c54228a055ec93fa9b
SHA1e62ffe4da87376b240698a561d3988beccfcdfd1
SHA256306097385a54f72e6031fb2df81e999e53863b1992a5cb3070c0cdd3f703d26c
SHA512b03410719730bf62fefb04b26e4b7ff684b6428305aa790b0aa4175cf2cb0862581f4367bf9dbefa0116d0cb0a090ccddbe40da1ba0afb338f03ed58697237cc