Analysis
-
max time kernel
146s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe
Resource
win7-20240708-en
General
-
Target
461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe
-
Size
1.2MB
-
MD5
6b4c8e0e5006698940118d954da9ea6b
-
SHA1
c9c1b519d8c44a25c14f054660a14a8c73f11ee4
-
SHA256
461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331
-
SHA512
7484cc2ea73961b39462c9973ba79f57bf5741405f35b1a31b9a2e238cbb2e4ab082e72a46a70b5f3a5365c40ee95eabddf6c594f5159e41cb970431d6b5546b
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8aul4pf4edYK:ETvC/MTQYxsWR7aucTO
Malware Config
Extracted
formbook
4.1
pt46
twinportslocal.com
rovor.store
98169.club
mdywl.com
jrd3s.rest
aston1717.top
floridawoodworkingmachinery.com
17tk555t.com
ankitsho.shop
seclameh.com
realrecordlabel.com
trenchonbirmingham.com
af28.top
rtp1kenzototo.com
theselflovesite.com
promotegetpaid.info
strategiclogisticsagency.com
learneracademy.net
per-watch.com
betbox2341.com
22958.xyz
birthdaywishestexts.com
nihilculturamail.com
vasymaman.com
evriukpostaes.sbs
winkingbots.com
cb214.pro
osakanacreation.com
kingchuxing.com
dr-cotton.net
iiixc759q.xyz
eraplay88rtpgacor.lat
wguujb.com
dental-implants-89083.bond
liposuction-89237.bond
harbalmaizik.com
seoservicesdelhi.net
fakefox.xyz
wimetimephotos.com
healthsaveplus.com
wvufcw948o.top
dieselrockpartners.com
istchannelnet.com
123moviesonl.com
arlatwestern.shop
cloudproduction.cloud
gv3l1.vip
casino-x-zerkalo27pm.xyz
serverdayz.com
dvdripguides.com
vitalfitness.site
c21candacedevillier.com
gory12.online
0452frl.com
escpethemtrix.top
koumimi.tech
me29hs38g1.com
dreziuy.xyz
uddyen.shop
asia76s.xyz
melliccine.com
olxelang.com
paincareathome.com
sliveringaf.christmas
wheresthechocolateat.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2996-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2996-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2996-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4976 set thread context of 2996 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 88 PID 2996 set thread context of 3488 2996 svchost.exe 55 PID 2996 set thread context of 3488 2996 svchost.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2996 svchost.exe 2996 svchost.exe 2996 svchost.exe 2996 svchost.exe 2996 svchost.exe 2996 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 2996 svchost.exe 2996 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2996 svchost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2996 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 88 PID 4976 wrote to memory of 2996 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 88 PID 4976 wrote to memory of 2996 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 88 PID 4976 wrote to memory of 2996 4976 461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe"C:\Users\Admin\AppData\Local\Temp\461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\461a2375bc1ab191cca91667ea8aecd498fad2b524bc81ca49eb7d5674063331.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2316
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3732
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1812
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:5084
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2124
-