Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe
Resource
win7-20240215-en
General
-
Target
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe
-
Size
1.0MB
-
MD5
4bcaa831d3aed104046c10e47dc8850e
-
SHA1
4f9e1249c407dbd9c0669f3158519eed96ae5980
-
SHA256
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45
-
SHA512
332f8ac217cbcd1ddf94c0d782ac33eefb4578faedc99bcd88afbeac304b5efed16920c4e9403806f3214c16c1ccb05143279a204e846b1d6562206d7bdeae14
-
SSDEEP
24576:0AHnh+eWsN3skA4RV1Hom2KXMmHa5ZchzV/S5:Dh+ZkldoPK8Ya5Zo5A
Malware Config
Extracted
formbook
4.1
se63
socratesandhisclouds.com
versioncolor.com
ytcp011.com
908511.vip
egysrvs.com
ky5682011.cc
kkuu14.icu
wavebsb.com
klikadelivery.com
jnbxbpq.com
5o8oh.us
hemule.net
techinf.xyz
bevage.club
we37h.com
tipsde.shop
48136.vip
bestcampertrailerbrands.com
fairmedics.in
quixonic.tech
aldcr.in
drepeacewp.com
odty914.net
live2move.us
galeriaspognardi.com
danauslot.shop
usapubpong.com
jingchen.xyz
xztyvk.xyz
butimarproductions.com
wuhangyjs.com
baddogdigital.com
mb28apparel.com
bnkk9o3zrgsy5.quest
playsolutionsinc.com
warriors4earth.com
gastric-balloon-71533.bond
adptgn.com
psicologiaparausted.com
gothecleaningpros.com
xnc8ki.vip
908511.vip
ozr3np.com
tradingbase.cloud
36h9.com
iaobet.net
6902470365.com
qasolvers.in
00047.vip
massiverole.shop
used-cars-66201.bond
baisexual.com
shoreswimschool.com
shrike.foo
shemosservicesllc.net
electric-cars-97134.bond
aicryptochain.com
wg5688.com
nomades.digital
thesiamesebetta.store
abbymartz.com
kimsnailsii.top
producepatch.shop
ebridgereal.site
cincinnatisoup.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1020-11-0x00000000006A0000-0x00000000006CF000-memory.dmp formbook behavioral2/memory/1020-15-0x00000000006A0000-0x00000000006CF000-memory.dmp formbook behavioral2/memory/2792-21-0x0000000000980000-0x00000000009AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exesvchost.exemstsc.exedescription pid process target process PID 2408 set thread context of 1020 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe svchost.exe PID 1020 set thread context of 3456 1020 svchost.exe Explorer.EXE PID 2792 set thread context of 3456 2792 mstsc.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2024 2408 WerFault.exe 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe -
Modifies registry class 1 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
svchost.exemstsc.exepid process 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe 2792 mstsc.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exesvchost.exemstsc.exepid process 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe 1020 svchost.exe 1020 svchost.exe 1020 svchost.exe 2792 mstsc.exe 2792 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
svchost.exeExplorer.EXEmstsc.exedescription pid process Token: SeDebugPrivilege 1020 svchost.exe Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeDebugPrivilege 2792 mstsc.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exeExplorer.EXEpid process 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe 3456 Explorer.EXE 3456 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exepid process 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exeExplorer.EXEmstsc.exedescription pid process target process PID 2408 wrote to memory of 1020 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe svchost.exe PID 2408 wrote to memory of 1020 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe svchost.exe PID 2408 wrote to memory of 1020 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe svchost.exe PID 2408 wrote to memory of 1020 2408 68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe svchost.exe PID 3456 wrote to memory of 2792 3456 Explorer.EXE mstsc.exe PID 3456 wrote to memory of 2792 3456 Explorer.EXE mstsc.exe PID 3456 wrote to memory of 2792 3456 Explorer.EXE mstsc.exe PID 2792 wrote to memory of 4208 2792 mstsc.exe cmd.exe PID 2792 wrote to memory of 4208 2792 mstsc.exe cmd.exe PID 2792 wrote to memory of 4208 2792 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe"C:\Users\Admin\AppData\Local\Temp\68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\68773735efbd467e3286df5cbd2cc678926f0821ebbc9c2633b215b31d0b7d45.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 7123⤵
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵PID:4208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2408 -ip 24081⤵PID:2096