Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 11:52
Static task
static1
Behavioral task
behavioral1
Sample
RFQ-ref_05921538.exe
Resource
win7-20240611-en
General
-
Target
RFQ-ref_05921538.exe
-
Size
918KB
-
MD5
fb14abc040c25c13849b4c44308d962d
-
SHA1
60f55621f11075f2e3af4ae41baf2794a58d6a66
-
SHA256
4c3b65dd4922985d090d2c12598837727e199627e48fd19b071472382b240284
-
SHA512
c2fc0aaee60cafcea97f0158cc013ddff8dc097215375a94ddc633ff2abe14da36c54cfb1e9865bf89984e532c7951b19e1cf776d002c19b49698a5f55cae81b
-
SSDEEP
12288:90mTFhv5VQZ9WsgF91raePmsr55MGBoIaEXRavD7R5GsYG2ucI0zei:90m/x4xgF9hmDGFGeGVKf
Malware Config
Extracted
formbook
4.1
na10
tetheus.com
ventlikeyoumeanit.com
tintbliss.com
rinabet357.com
sapphireboutiqueusa.com
abc8bet6.com
xzcn3i7jb13cqei.buzz
pinktravelsnagpur.com
bt365038.com
rtpbossujang303.shop
osthirmaker.com
thelonelyteacup.com
rlc2019.com
couverture-charpente.com
productivagc.com
defendercarcare.com
abcentixdigital.com
petco.ltd
oypivh.top
micro.guru
hokivegasslots.club
5663876.com
symboleffekt.info
tworiverlabsintake.com
pegaso.store
sasoera.com
material.chat
taniamckirdy.com
dansistosproductions.com
moromorojp.com
z27e1thx976ez3u.buzz
skinrenue.com
nbvci.xyz
jakobniinja.xyz
snykee.com
sl24.top
wawturkiye.xyz
virtualeventsbyelaine.com
giorgiaclerico.com
d9psk8.xyz
hard-to-miss.space
awclog.com
topcomparativos.com
somoyboutique.com
findlove.pro
zbo170.app
dexcoenergy.com
nona23.lat
ingelset.com
hexatelier.com
nftees.tech
visionarymaterialsinstitute.com
khanyos.com
bz59.top
migraine-treatment-28778.bond
catboxbot.online
kkugames.com
llmsearchoptimization.com
fipbhvvb.xyz
vmytzptc.xyz
intermediafx.shop
lhrrs.com
grimreapervalley.com
discount-fess.space
liamcollinai.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2912-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2912-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/376-25-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2696 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RFQ-ref_05921538.exeRFQ-ref_05921538.execmstp.exedescription pid process target process PID 352 set thread context of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 2912 set thread context of 1204 2912 RFQ-ref_05921538.exe Explorer.EXE PID 376 set thread context of 1204 376 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
RFQ-ref_05921538.exeRFQ-ref_05921538.execmstp.exepid process 352 RFQ-ref_05921538.exe 352 RFQ-ref_05921538.exe 2912 RFQ-ref_05921538.exe 2912 RFQ-ref_05921538.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe 376 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RFQ-ref_05921538.execmstp.exepid process 2912 RFQ-ref_05921538.exe 2912 RFQ-ref_05921538.exe 2912 RFQ-ref_05921538.exe 376 cmstp.exe 376 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ-ref_05921538.exeRFQ-ref_05921538.execmstp.exedescription pid process Token: SeDebugPrivilege 352 RFQ-ref_05921538.exe Token: SeDebugPrivilege 2912 RFQ-ref_05921538.exe Token: SeDebugPrivilege 376 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
RFQ-ref_05921538.exeExplorer.EXEcmstp.exedescription pid process target process PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 352 wrote to memory of 2912 352 RFQ-ref_05921538.exe RFQ-ref_05921538.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 1204 wrote to memory of 376 1204 Explorer.EXE cmstp.exe PID 376 wrote to memory of 2696 376 cmstp.exe cmd.exe PID 376 wrote to memory of 2696 376 cmstp.exe cmd.exe PID 376 wrote to memory of 2696 376 cmstp.exe cmd.exe PID 376 wrote to memory of 2696 376 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ-ref_05921538.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-ref_05921538.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ-ref_05921538.exe"C:\Users\Admin\AppData\Local\Temp\RFQ-ref_05921538.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ-ref_05921538.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/352-13-0x0000000074440000-0x0000000074B2E000-memory.dmpFilesize
6.9MB
-
memory/352-12-0x000000007444E000-0x000000007444F000-memory.dmpFilesize
4KB
-
memory/352-0-0x000000007444E000-0x000000007444F000-memory.dmpFilesize
4KB
-
memory/352-3-0x00000000004B0000-0x00000000004F4000-memory.dmpFilesize
272KB
-
memory/352-4-0x0000000000700000-0x000000000071A000-memory.dmpFilesize
104KB
-
memory/352-5-0x00000000008D0000-0x00000000008D6000-memory.dmpFilesize
24KB
-
memory/352-15-0x0000000074440000-0x0000000074B2E000-memory.dmpFilesize
6.9MB
-
memory/352-2-0x0000000074440000-0x0000000074B2E000-memory.dmpFilesize
6.9MB
-
memory/352-1-0x0000000001020000-0x000000000110C000-memory.dmpFilesize
944KB
-
memory/376-25-0x0000000000090000-0x00000000000BF000-memory.dmpFilesize
188KB
-
memory/376-24-0x0000000000C50000-0x0000000000C68000-memory.dmpFilesize
96KB
-
memory/376-22-0x0000000000C50000-0x0000000000C68000-memory.dmpFilesize
96KB
-
memory/1204-20-0x0000000003AE0000-0x0000000003BE0000-memory.dmpFilesize
1024KB
-
memory/1204-28-0x0000000006410000-0x0000000006582000-memory.dmpFilesize
1.4MB
-
memory/1204-21-0x0000000006410000-0x0000000006582000-memory.dmpFilesize
1.4MB
-
memory/1204-26-0x0000000000010000-0x0000000000020000-memory.dmpFilesize
64KB
-
memory/2912-16-0x00000000008D0000-0x0000000000BD3000-memory.dmpFilesize
3.0MB
-
memory/2912-19-0x0000000000110000-0x0000000000124000-memory.dmpFilesize
80KB
-
memory/2912-18-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2912-10-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2912-8-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2912-6-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2912-14-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB