Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
AB2hQJZ77ipdWem.exe
Resource
win7-20240704-en
General
-
Target
AB2hQJZ77ipdWem.exe
-
Size
606KB
-
MD5
f640126d8e76c2a343754ff0f41c1eef
-
SHA1
b00e9297c74fe4847f4a0667d9cc4379409cb501
-
SHA256
f9e519cd66cb6bed521306afb703672ef2ed9d82d8341398c4199be4523cad96
-
SHA512
cd05b460ce74792dbc91891cc13ad888f894c05747907bce0dd79193a126e996e7efadfb7831aee0fd219f3ba92f55858cdf4dbfed876280585daedb92c20083
-
SSDEEP
12288:1DrlAypLTnapSEkztfGLI70wWsrRJvHG5yCgMLCAUIKtT:PAyp/naSft+s70wfHvH3iCp9
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3844-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3844-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3956-20-0x0000000000150000-0x000000000017F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4004 set thread context of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 3844 set thread context of 3456 3844 AB2hQJZ77ipdWem.exe 54 PID 3956 set thread context of 3456 3956 cmmon32.exe 54 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3844 AB2hQJZ77ipdWem.exe 3844 AB2hQJZ77ipdWem.exe 3844 AB2hQJZ77ipdWem.exe 3844 AB2hQJZ77ipdWem.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe 3956 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3844 AB2hQJZ77ipdWem.exe 3844 AB2hQJZ77ipdWem.exe 3844 AB2hQJZ77ipdWem.exe 3956 cmmon32.exe 3956 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3844 AB2hQJZ77ipdWem.exe Token: SeDebugPrivilege 3956 cmmon32.exe Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3456 Explorer.EXE 3456 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 4004 wrote to memory of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 4004 wrote to memory of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 4004 wrote to memory of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 4004 wrote to memory of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 4004 wrote to memory of 3844 4004 AB2hQJZ77ipdWem.exe 92 PID 3456 wrote to memory of 3956 3456 Explorer.EXE 93 PID 3456 wrote to memory of 3956 3456 Explorer.EXE 93 PID 3456 wrote to memory of 3956 3456 Explorer.EXE 93 PID 3956 wrote to memory of 1524 3956 cmmon32.exe 95 PID 3956 wrote to memory of 1524 3956 cmmon32.exe 95 PID 3956 wrote to memory of 1524 3956 cmmon32.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\AB2hQJZ77ipdWem.exe"C:\Users\Admin\AppData\Local\Temp\AB2hQJZ77ipdWem.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\AB2hQJZ77ipdWem.exe"C:\Users\Admin\AppData\Local\Temp\AB2hQJZ77ipdWem.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AB2hQJZ77ipdWem.exe"3⤵PID:1524
-
-