Analysis
-
max time kernel
55s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 16:54
Behavioral task
behavioral1
Sample
csbdnquus.exe
Resource
win7-20240705-en
General
-
Target
csbdnquus.exe
-
Size
760KB
-
MD5
c431847b601038a906219f4429c30bf4
-
SHA1
2e31eb56b0bc1c655c8d86347398276067f0b15e
-
SHA256
f51db63fe8be8e59e25e8363e5930309e9a9148925e583da18ea7e31bc9b0a96
-
SHA512
84c19678c4be4a48c6759a396d93783143972ae0616ab23e6a9bb453c7ecd3c50d7fe0d3e1293e7146023cb4fc2767cbe75bd72ca51d2bb831d5ecb1c9e0104a
-
SSDEEP
6144:/Bz+lXZtn35VWFiGP8XJD/HobegCAStpL+kmNw0Fq2ecTY668wC1:/sZt35Vy85jubwt5Ln0D3Y4wU
Malware Config
Extracted
formbook
4.1
2cur
bedsireland.com
ant-coupon.com
dreamsconsultoria.com
ufologypublishing.com
zhenghelab.com
3c-passion-for-furniture.com
ristorantegadir.com
sxcigars.com
moss-solutions.com
uc-work.net
narutocoin.net
alettae.com
sheepnotes.com
stylemefrugal.com
equifaxsefurity2017.com
sanvalentinoday.com
islambrain.com
pahladvisors.net
tekno65.com
bets4affiliates.com
xn--dm2bv6a99blx0b.com
uzuntourism.com
americandentalconsulting.com
jindiandj.com
ueholidays.com
funwithgoats.com
carrestyling.com
uunicro-cr-kr.com
kreditdbsjakarta.com
flashmobconsultancy.com
xn--l9qya333bir1e.net
crone.online
yourshakespearelady.com
philadelpiaexecutivecoach.com
mesclo.com
saint-petersburg.international
cncbkcq.com
shrutisinghal.com
qatestingclubious.com
tbk-photography.com
i-medianetwork.com
imlmi.loan
thedoveshack.com
caasanetwoks.com
ilrkk.com
savaspen.com
51qdm.com
shoptildrop.net
kjz168.com
clare-oconnor.com
wilderfinishings.com
pinpaijiafang.com
tian24.com
themultivrse.com
premiercbdshop.com
msduss.net
alaylayzcornerspot.com
bhi-digital-accelerator.com
firstmoviez.info
desgift.com
fujisanonsensui.com
bosoox.com
keyholestoves.com
czmsxj.com
fex-tracks.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/1704-1-0x0000000001350000-0x0000000001414000-memory.dmp formbook behavioral1/memory/2804-17-0x0000000000080000-0x00000000000AE000-memory.dmp formbook behavioral1/memory/2804-20-0x0000000000080000-0x00000000000AE000-memory.dmp formbook behavioral1/memory/2940-26-0x0000000000080000-0x00000000000AE000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2804 AddInProcess32.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 csbdnquus.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1704 set thread context of 2804 1704 csbdnquus.exe 30 PID 2804 set thread context of 1380 2804 AddInProcess32.exe 21 PID 2940 set thread context of 1380 2940 wininit.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csbdnquus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1704 csbdnquus.exe 1704 csbdnquus.exe 1704 csbdnquus.exe 2804 AddInProcess32.exe 2804 AddInProcess32.exe 2940 wininit.exe 2940 wininit.exe 1704 csbdnquus.exe 1704 csbdnquus.exe 2940 wininit.exe 2940 wininit.exe 2940 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2804 AddInProcess32.exe 2804 AddInProcess32.exe 2804 AddInProcess32.exe 2940 wininit.exe 2940 wininit.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1704 csbdnquus.exe Token: SeDebugPrivilege 2804 AddInProcess32.exe Token: SeDebugPrivilege 2940 wininit.exe Token: SeShutdownPrivilege 1380 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1704 wrote to memory of 2804 1704 csbdnquus.exe 30 PID 1380 wrote to memory of 2940 1380 Explorer.EXE 31 PID 1380 wrote to memory of 2940 1380 Explorer.EXE 31 PID 1380 wrote to memory of 2940 1380 Explorer.EXE 31 PID 1380 wrote to memory of 2940 1380 Explorer.EXE 31 PID 2940 wrote to memory of 2200 2940 wininit.exe 32 PID 2940 wrote to memory of 2200 2940 wininit.exe 32 PID 2940 wrote to memory of 2200 2940 wininit.exe 32 PID 2940 wrote to memory of 2200 2940 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\csbdnquus.exe"C:\Users\Admin\AppData\Local\Temp\csbdnquus.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD56a673bfc3b67ae9782cb31af2f234c68
SHA17544e89566d91e84e3cd437b9a073e5f6b56566e
SHA256978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e
SHA51272c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39