Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe
Resource
win7-20240611-en
General
-
Target
c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe
-
Size
1.0MB
-
MD5
f44bc4e0027f0f44d75fed04b8416be2
-
SHA1
70fffcae8382f82570ec5b8e0389e7378c5db522
-
SHA256
c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe
-
SHA512
506d386d7fbd7506930017ba869573bb1e21762c002fb686740ef9cfd906459886fba519486600582f5ab903a958ddfeed81d5df92af6a16c2cc6951e34e9458
-
SSDEEP
12288:5D9Q6t+p9J/s61NobMm1k4Wcqx9cpwtNHdlIoXcPANAe5WdNH6gsmxhgR6ZdEyGk:yoYck4JqncElfcINPewgsw26ZdxAx87
Malware Config
Extracted
formbook
4.1
ps94
gokorgiboard.com
17tk558f.com
xbtdlz.com
agence-dyf.com
azovtour.com
refreshoutdoors.shop
muyidajs.com
bull007s.autos
huskyacres.net
nryijx628b.xyz
romansotam.com
norlac.xyz
dorsetbusinessforum.com
prpasti.shop
amycostellospeech.com
dpaijvpiajvpin.top
rinabet371.com
corporatebushcraft.com
0755xx.com
wxsjlwkj2019.com
cjyegfoj.net
t5u2s.xyz
light-in-the-heavens.com
forluvofcomedy.com
modevow.com
doising.com
mpcihjpo.xyz
readysetmarkit.com
0909000000.com
checkout4xgrow.shop
whatsapp-p.vip
vpdyt637j.xyz
sunnykiki.net
yesspin.vip
mbduattf.net
gkjjic1ti9.xyz
coindoody.com
st-petersburghpirates.com
khsv4r.top
xsmci844n.xyz
lottiedottieclayco.com
hregrhherdhretdhrt.xyz
rd15.top
parsendustriyel.com
southernsweetsboxco.com
swattonracing.com
streamfly.video
everygrow.xyz
4iszk17p.top
roofing-jobs-97892.bond
625251.com
slotgacor4dline.site
marykellerbechem.com
mjdwmft.life
theip.pro
htgithub.com
aianswerforaluminium.com
vtscw364x.xyz
eroshiroutomatomekojin.com
datanexusmarketing.com
premierdrops.agency
fareast-trading.com
ddsmb.club
transpecosexpress.com
rgrogerscreations.com
Signatures
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3040-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exedescription pid process target process PID 1748 set thread context of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exepowershell.exepid process 3040 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe 2708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2708 powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exedescription pid process target process PID 1748 wrote to memory of 2708 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe powershell.exe PID 1748 wrote to memory of 2708 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe powershell.exe PID 1748 wrote to memory of 2708 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe powershell.exe PID 1748 wrote to memory of 2708 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe powershell.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe PID 1748 wrote to memory of 3040 1748 c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe"C:\Users\Admin\AppData\Local\Temp\c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe"C:\Users\Admin\AppData\Local\Temp\c019951411af4b89614d39e15b69e1798f267c54aebfe7e61852e4626bf00cbe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1748-0-0x00000000740EE000-0x00000000740EF000-memory.dmpFilesize
4KB
-
memory/1748-1-0x0000000000FB0000-0x00000000010BA000-memory.dmpFilesize
1.0MB
-
memory/1748-2-0x00000000740E0000-0x00000000747CE000-memory.dmpFilesize
6.9MB
-
memory/1748-3-0x0000000000720000-0x0000000000730000-memory.dmpFilesize
64KB
-
memory/1748-4-0x0000000000760000-0x000000000076C000-memory.dmpFilesize
48KB
-
memory/1748-5-0x0000000004860000-0x00000000048D6000-memory.dmpFilesize
472KB
-
memory/1748-17-0x00000000740E0000-0x00000000747CE000-memory.dmpFilesize
6.9MB
-
memory/3040-6-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3040-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3040-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/3040-8-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/3040-14-0x00000000008E0000-0x0000000000BE3000-memory.dmpFilesize
3.0MB