Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
V691KUgebCvcYp2.exe
Resource
win7-20240704-en
General
-
Target
V691KUgebCvcYp2.exe
-
Size
616KB
-
MD5
54df980a554dd390a666241611bdc853
-
SHA1
9ec3172879f4f5ee153af834d9118f2a59a45c8d
-
SHA256
ecf7d21e6034165420d152b1c77462ac51da9950be2b4eb32f966eda29376aa5
-
SHA512
6eae852e045e7259a7f9f08caa30a37434e9eac37bcc2ebcd664153a80367e611e56b6d8c557e284a42cd3677233025fde106ede8d397ed7ae1decd54a78af7e
-
SSDEEP
12288:ziN882BB6X47oXvsFpK6yDJAbAyOSCEZhrtL5IuviN:zu2BcX47ofUY6yDJAsyOShyg
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2332-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2332-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2332-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/536-26-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1516 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2676 set thread context of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2332 set thread context of 1212 2332 V691KUgebCvcYp2.exe 21 PID 2332 set thread context of 1212 2332 V691KUgebCvcYp2.exe 21 PID 536 set thread context of 1212 536 wuapp.exe 21 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2676 V691KUgebCvcYp2.exe 2332 V691KUgebCvcYp2.exe 2332 V691KUgebCvcYp2.exe 2332 V691KUgebCvcYp2.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe 536 wuapp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2332 V691KUgebCvcYp2.exe 2332 V691KUgebCvcYp2.exe 2332 V691KUgebCvcYp2.exe 2332 V691KUgebCvcYp2.exe 536 wuapp.exe 536 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2676 V691KUgebCvcYp2.exe Token: SeDebugPrivilege 2332 V691KUgebCvcYp2.exe Token: SeDebugPrivilege 536 wuapp.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2632 2676 V691KUgebCvcYp2.exe 28 PID 2676 wrote to memory of 2632 2676 V691KUgebCvcYp2.exe 28 PID 2676 wrote to memory of 2632 2676 V691KUgebCvcYp2.exe 28 PID 2676 wrote to memory of 2632 2676 V691KUgebCvcYp2.exe 28 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 2676 wrote to memory of 2332 2676 V691KUgebCvcYp2.exe 29 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 1212 wrote to memory of 536 1212 Explorer.EXE 57 PID 536 wrote to memory of 1516 536 wuapp.exe 58 PID 536 wrote to memory of 1516 536 wuapp.exe 58 PID 536 wrote to memory of 1516 536 wuapp.exe 58 PID 536 wrote to memory of 1516 536 wuapp.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"3⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2788
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2576
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2864
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2812
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2516
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1716
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2624
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2652
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2600
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2544
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2728
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2492
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2500
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2508
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2520
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2560
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2608
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2960
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3008
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2764
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2232
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2088
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2656
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2972
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2976
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1648
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1824
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\V691KUgebCvcYp2.exe"3⤵
- Deletes itself
PID:1516
-
-