Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
4azjP1pzssf79mP.exe
Resource
win7-20240708-en
General
-
Target
4azjP1pzssf79mP.exe
-
Size
632KB
-
MD5
44e15810a7cc4c85a45c0d786e795904
-
SHA1
6a13dd37d6ab5a44c4ecdc602a8175d32ade0450
-
SHA256
63e3b4304b855b3219c28b8d5306241564ac5f1752a01b5b793ee7733b4c69a7
-
SHA512
7702302ec0a34ee53e3084a98f23f2af241c70f2c74eb08da948a95a0e9a8cbfacb27e76f7e3175f85b9e88da4d80fced80aafdf1d2739dfce28bee99864650b
-
SSDEEP
12288:wunSY+aZrwrLxdgGs2oPDNDZsS00YykWQ0F3ytl2In54Ci8wzk:n/4rLzgGsRBDZBkWQ0F35InfiR
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2716-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2716-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2716-23-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2860-28-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2524 set thread context of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2716 set thread context of 1196 2716 4azjP1pzssf79mP.exe 21 PID 2716 set thread context of 1196 2716 4azjP1pzssf79mP.exe 21 PID 2860 set thread context of 1196 2860 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4azjP1pzssf79mP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2716 4azjP1pzssf79mP.exe 2716 4azjP1pzssf79mP.exe 2716 4azjP1pzssf79mP.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe 2860 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2716 4azjP1pzssf79mP.exe 2716 4azjP1pzssf79mP.exe 2716 4azjP1pzssf79mP.exe 2716 4azjP1pzssf79mP.exe 2860 msdt.exe 2860 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2716 4azjP1pzssf79mP.exe Token: SeDebugPrivilege 2860 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 2524 wrote to memory of 2716 2524 4azjP1pzssf79mP.exe 31 PID 1196 wrote to memory of 2860 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2860 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2860 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2860 1196 Explorer.EXE 32 PID 2860 wrote to memory of 3068 2860 msdt.exe 33 PID 2860 wrote to memory of 3068 2860 msdt.exe 33 PID 2860 wrote to memory of 3068 2860 msdt.exe 33 PID 2860 wrote to memory of 3068 2860 msdt.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\4azjP1pzssf79mP.exe"C:\Users\Admin\AppData\Local\Temp\4azjP1pzssf79mP.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\4azjP1pzssf79mP.exe"C:\Users\Admin\AppData\Local\Temp\4azjP1pzssf79mP.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\4azjP1pzssf79mP.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3068
-
-