Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
h8N9qpyRAPaiitu.exe
Resource
win7-20240611-en
General
-
Target
h8N9qpyRAPaiitu.exe
-
Size
795KB
-
MD5
a6d026ed6d34720275d8d6fd98ad5113
-
SHA1
fb398d1e20b29f5dc346a7b84309a0e5c55ce7d7
-
SHA256
a4e1544dee96f911479934ecd89b51ead1ee008026a2468f65167e0d76cb459c
-
SHA512
9c46f3271e02a45b63beac8e74c84fc05a987ffb53fd41fa79c1d60a1c8379d72bc1df256dc7ba9e01363e0767e616e5ee4b32c22c9efbd1ea8496eb8364f324
-
SSDEEP
12288:9TCE8GILjWLWgAnOKU1AIcP4CVIadpBR8wZLm5cAw0sVj0b1SMp0dR:ccAOKU1AIlihPPlZLmZw2pp4
Malware Config
Extracted
formbook
4.1
mc10
sttcorp.one
jack88.lat
owl-protect.com
hnszrrn.com
at89v2.com
h147.top
takle4creators.com
fondsa.xyz
mantenopolice.com
shophansler.com
dessertt.com
thecollisionmagazine.com
tatesfluffyfrenchies.com
h1f2v.rest
bluewandltd.com
cuplaho2003.shop
2thetcleaningservice.com
yc85w.top
natursache.shop
allmyabilities.com
sorteioagora.shop
291van.fun
bforeplay.com
playcoy99.com
grapplegrid.app
machaiproductions.com
bjcysadz.xyz
hg44a.com
english4u.online
w15hh.rest
kurainu.xyz
psycrowolgy.com
quantron.xyz
realtors.biz
hjjhggh.top
767jogo.com
inspirationandhumor.com
basedawgz.live
jigofort.com
bonjourmignon.com
huttonsidel.online
iffacosmetics.com
483yes.com
motolimod.com
xatapartners.com
laurelhw.com
sztopsports.com
ethermail-register.com
ust-online.com
theofficescowork.com
arkonwheels.com
projectorvibe.com
xpanas.black
gemaroke2.shop
sofiastory.store
dealerxai.com
zerolength.xyz
marketmaventesfayellc.site
instrumentsurvey-dinarjatim.com
ajansyapai.net
llngx.com
onwardgrowth.com
useprize.com
zaki-argan.com
sainikshiksha.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2600-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2600-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2760-25-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2860 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
h8N9qpyRAPaiitu.exeh8N9qpyRAPaiitu.execolorcpl.exedescription pid process target process PID 1096 set thread context of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 2600 set thread context of 1340 2600 h8N9qpyRAPaiitu.exe Explorer.EXE PID 2600 set thread context of 1340 2600 h8N9qpyRAPaiitu.exe Explorer.EXE PID 2760 set thread context of 1340 2760 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
h8N9qpyRAPaiitu.execolorcpl.exepid process 2600 h8N9qpyRAPaiitu.exe 2600 h8N9qpyRAPaiitu.exe 2600 h8N9qpyRAPaiitu.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe 2760 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
h8N9qpyRAPaiitu.execolorcpl.exepid process 2600 h8N9qpyRAPaiitu.exe 2600 h8N9qpyRAPaiitu.exe 2600 h8N9qpyRAPaiitu.exe 2600 h8N9qpyRAPaiitu.exe 2760 colorcpl.exe 2760 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
h8N9qpyRAPaiitu.execolorcpl.exedescription pid process Token: SeDebugPrivilege 2600 h8N9qpyRAPaiitu.exe Token: SeDebugPrivilege 2760 colorcpl.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
h8N9qpyRAPaiitu.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1096 wrote to memory of 2600 1096 h8N9qpyRAPaiitu.exe h8N9qpyRAPaiitu.exe PID 1340 wrote to memory of 2760 1340 Explorer.EXE colorcpl.exe PID 1340 wrote to memory of 2760 1340 Explorer.EXE colorcpl.exe PID 1340 wrote to memory of 2760 1340 Explorer.EXE colorcpl.exe PID 1340 wrote to memory of 2760 1340 Explorer.EXE colorcpl.exe PID 2760 wrote to memory of 2860 2760 colorcpl.exe cmd.exe PID 2760 wrote to memory of 2860 2760 colorcpl.exe cmd.exe PID 2760 wrote to memory of 2860 2760 colorcpl.exe cmd.exe PID 2760 wrote to memory of 2860 2760 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\h8N9qpyRAPaiitu.exe"C:\Users\Admin\AppData\Local\Temp\h8N9qpyRAPaiitu.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\h8N9qpyRAPaiitu.exe"C:\Users\Admin\AppData\Local\Temp\h8N9qpyRAPaiitu.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\h8N9qpyRAPaiitu.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1096-1-0x00000000002A0000-0x000000000036C000-memory.dmpFilesize
816KB
-
memory/1096-2-0x0000000074180000-0x000000007486E000-memory.dmpFilesize
6.9MB
-
memory/1096-3-0x0000000000460000-0x0000000000470000-memory.dmpFilesize
64KB
-
memory/1096-4-0x0000000000770000-0x000000000077C000-memory.dmpFilesize
48KB
-
memory/1096-5-0x0000000004C20000-0x0000000004C96000-memory.dmpFilesize
472KB
-
memory/1096-0-0x000000007418E000-0x000000007418F000-memory.dmpFilesize
4KB
-
memory/1096-11-0x0000000074180000-0x000000007486E000-memory.dmpFilesize
6.9MB
-
memory/1340-17-0x0000000006D70000-0x0000000006E6B000-memory.dmpFilesize
1004KB
-
memory/1340-28-0x0000000004DA0000-0x0000000004E88000-memory.dmpFilesize
928KB
-
memory/1340-22-0x0000000004DA0000-0x0000000004E88000-memory.dmpFilesize
928KB
-
memory/1340-19-0x0000000006D70000-0x0000000006E6B000-memory.dmpFilesize
1004KB
-
memory/1340-14-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/2600-7-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2600-16-0x0000000000270000-0x0000000000284000-memory.dmpFilesize
80KB
-
memory/2600-15-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2600-12-0x00000000008D0000-0x0000000000BD3000-memory.dmpFilesize
3.0MB
-
memory/2600-6-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2600-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2600-21-0x00000000003A0000-0x00000000003B4000-memory.dmpFilesize
80KB
-
memory/2600-20-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2600-10-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/2760-23-0x0000000000980000-0x0000000000998000-memory.dmpFilesize
96KB
-
memory/2760-24-0x0000000000980000-0x0000000000998000-memory.dmpFilesize
96KB
-
memory/2760-25-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB