Analysis
-
max time kernel
111s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
b5c5bfa486e42a1f753a993f5fd4c850N.exe
Resource
win7-20240704-en
General
-
Target
b5c5bfa486e42a1f753a993f5fd4c850N.exe
-
Size
638KB
-
MD5
b5c5bfa486e42a1f753a993f5fd4c850
-
SHA1
a6e3226e45c448c599bcc694a81ff9dc5d7b05b3
-
SHA256
a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89
-
SHA512
fcae4141137f6ccb4210564a16d88c6ffa46addb6d83e435362141219374d7c22b3af2b8f6c9ceb0cbc8568348cb2cdaa1a3af40ab09188d6bb53b5de0338f33
-
SSDEEP
12288:BhhwoIc0qIL6oPA6bBOcMLyNjYzRIvcjZoUMNA7MCoORaEZ/zy4KBX:BbwoIc0qIk6bBOJyN4pZNKA4sbdc
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1840-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4032 set thread context of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5c5bfa486e42a1f753a993f5fd4c850N.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 1840 b5c5bfa486e42a1f753a993f5fd4c850N.exe 1840 b5c5bfa486e42a1f753a993f5fd4c850N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4032 wrote to memory of 3212 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 94 PID 4032 wrote to memory of 3212 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 94 PID 4032 wrote to memory of 3212 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 94 PID 4032 wrote to memory of 3000 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 95 PID 4032 wrote to memory of 3000 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 95 PID 4032 wrote to memory of 3000 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 95 PID 4032 wrote to memory of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96 PID 4032 wrote to memory of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96 PID 4032 wrote to memory of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96 PID 4032 wrote to memory of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96 PID 4032 wrote to memory of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96 PID 4032 wrote to memory of 1840 4032 b5c5bfa486e42a1f753a993f5fd4c850N.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"2⤵PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"2⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"C:\Users\Admin\AppData\Local\Temp\b5c5bfa486e42a1f753a993f5fd4c850N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-