Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
LSW51096D32024I.exe
Resource
win7-20240705-en
General
-
Target
LSW51096D32024I.exe
-
Size
653KB
-
MD5
8691b9bda57b18592afe76b9a8265ad3
-
SHA1
51c0b367762361da72cc2b36d317b188c9a51b59
-
SHA256
a8af52f378b0d8cc71513411d4af5c383147c03064981084c63125b3f57b7f6a
-
SHA512
56d80eae6b52800ebde89e6aecc2f40050dbabb82d65158f2a934bcfdc897f936f3293a557de689ce56a7223337ffa6d1b2bcee15af081c7203142d7e28563f6
-
SSDEEP
12288:QI2iNeSY+aZrwrhWAqSruftYXDEt+FL+rXu8gLvCN2avJ5S:T14/4rhWAqSruftWFK9gLvCRR5
Malware Config
Extracted
formbook
4.1
de94
way2future.net
worldnewsdailys.online
rendamaisbr.com
s485.icu
vcxwpo.xyz
imagivilleartists.com
herbatyorganics.com
xn--80ado1abokv5d.xn--p1acf
invigoratewell.com
especialistaleitura.online
pkrstg.com
performacaretechnical.com
dreamgame55.net
hkitgugx.xyz
istanlikbilgiler.click
slotter99j.vip
exploringtheoutdoors.net
triberoots.com
energiaslotsbet.com
dkforcm.com
rtp1kijangwin.top
monkeytranslate.com
21stcut.shop
hgty866.xyz
shaktitest.site
monrocasino-508.com
level4d1.bet
nbcze.com
rtproketslotcsn.art
xjps.ltd
yoanamod.com
gv031.net
mceliteroofing.com
1wtrh.com
online-dating-24966.bond
dentalbrasstacks.com
kf7wzmuzv0w.xyz
gyosei-arimura.com
shopyzones.shop
bradleyboy.xyz
bradleyboy.xyz
nownzen.store
buysellrepresent.com
tateshades.xyz
club1stclass.com
2309238042.com
ashleymorgan.live
xn--pdr89n.vip
princecl.xyz
mindfulmanifest.net
c4ads.net
exlith.com
jiogskeojg.xyz
lxrtl.com
cshark-sguser.com
h021b.rest
alfiethorhalls.com
librosinfantiles.top
alazamexports.com
mehalhouse.com
slvtapeworld.com
mybest.engineer
legalix.xyz
kuuichi.xyz
happygreenfarm.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/2104-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2104-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2104-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4836-26-0x0000000000D20000-0x0000000000D4F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3808 set thread context of 2104 3808 LSW51096D32024I.exe 86 PID 2104 set thread context of 3548 2104 LSW51096D32024I.exe 56 PID 2104 set thread context of 3548 2104 LSW51096D32024I.exe 56 PID 4836 set thread context of 3548 4836 raserver.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSW51096D32024I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe 4836 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 2104 LSW51096D32024I.exe 4836 raserver.exe 4836 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2104 LSW51096D32024I.exe Token: SeDebugPrivilege 4836 raserver.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3548 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2104 3808 LSW51096D32024I.exe 86 PID 3808 wrote to memory of 2104 3808 LSW51096D32024I.exe 86 PID 3808 wrote to memory of 2104 3808 LSW51096D32024I.exe 86 PID 3808 wrote to memory of 2104 3808 LSW51096D32024I.exe 86 PID 3808 wrote to memory of 2104 3808 LSW51096D32024I.exe 86 PID 3808 wrote to memory of 2104 3808 LSW51096D32024I.exe 86 PID 3548 wrote to memory of 4836 3548 Explorer.EXE 87 PID 3548 wrote to memory of 4836 3548 Explorer.EXE 87 PID 3548 wrote to memory of 4836 3548 Explorer.EXE 87 PID 4836 wrote to memory of 924 4836 raserver.exe 88 PID 4836 wrote to memory of 924 4836 raserver.exe 88 PID 4836 wrote to memory of 924 4836 raserver.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\LSW51096D32024I.exe"C:\Users\Admin\AppData\Local\Temp\LSW51096D32024I.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\LSW51096D32024I.exe"C:\Users\Admin\AppData\Local\Temp\LSW51096D32024I.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\LSW51096D32024I.exe"3⤵
- System Location Discovery: System Language Discovery
PID:924
-
-