Analysis
-
max time kernel
116s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
808bc55dfd04bde28b5a81eeffa1be00N.exe
Resource
win7-20240704-en
General
-
Target
808bc55dfd04bde28b5a81eeffa1be00N.exe
-
Size
1.7MB
-
MD5
808bc55dfd04bde28b5a81eeffa1be00
-
SHA1
1ac47e1d51466f5031b1096d40816abb90d36668
-
SHA256
1968771402227e2db604f63085104459de416107146f4d21a50c6e6e866f4324
-
SHA512
e8b2d3e05adcb2da69780f1a4cea88c7f830d9d9d3a41abacc2cdf22b06ed5992a77a61e142c2622e210bd981fa20f710183aa2efa164b60d3c6aaed4f227c59
-
SSDEEP
24576:0G/gSI7uzvdh53ATay0Lu9fE124K2Gzo/Xyhp4HtNLpTGLRvO4x:dgruLMayJWao/XC6B
Malware Config
Extracted
formbook
dcn0
ZVx68vDtAMBCwg==
oBMBvsNORkM/O/ox
Ff9pISWkm6eG4lByIspp
c2T42c6CIIF6B8xTxm9XzpVw
bvjhxRbnAC183w==
0lTttSNG4HUDNflyIspp
hPXFlstqiHA/O/ox
WLR+MeerxZ0cNn1ja+IQAYo=
IHRn4xXOVKi477zarG+ObSy7YJA=
Xhf3e+tdAC183w==
Xk0ZAezv2rWH
kngo+vBeSRN7AszNwam3Osmguuqc0MoC
a2Qp7a+E8fSw7LDjpnqEKjsRZA==
3zjy4E7+QM48wg==
YcCmqT3OUNAigVott2pBKiy7YJA=
4+SMeX1juat/5cZ1AZihcyy7YJA=
/+m7sro0OBTl3TMpCw==
i2ctEfe4//a64yklMsgS2J90
+loZ2QKGX0UWgpvErMs=
b9BNCnJWQJS8IfsR0uR3bCy7YJA=
9eiUYE0ynHE/O/ox
F2/75pOIYNg0hzOD99192J8=
Y1xOONdO105okfha33EZ2A==
qYZIIB+dfF0wp1nVWFz067hJ2/qoXEVeAA==
moQMzat7tfKyKPYs
aMZJI/NfUSSpPQUBJ8/11g==
QKMN15GjpHcpyA==
6+S1hTvphhFfoCdj6tw=
DPynhWcnZWho7a0p33EZ2A==
EXY//zDm7ej3Guwo
PSWxPYkk0SNioSdj6tw=
jv+tmhv1ySZloydj6tw=
P8GUV5BhNZflCCBBFg==
IQZ0PWog1lcVVkJYHg==
aOTCq/Cet6AdhSdj6tw=
OBzJrqYS+eac46nZo4aI84kWMEtH
kBzTkbI2LTo/O/ox
a8pwOrU/tyx93a/QrGBpXGQIfZI=
GWoC9K5Mx0GR34urFcDPyQ==
dGxKGM2FI4iAkTOD99192J8=
UqQv8Vkx7WzkCCBBFg==
NcBsPK+YmdZP0cyhY+Lrzw==
zcKbk5oK7NCgFOpa4tHv0g==
uIomFkUTzdWa
QkAF8NuWMZmnPjCFgJBa+Y1t
51w6Gw7c3NyY
IyDnsW89dXaMrAxotF8jGZc=
1s1RHCrCwI8PnVhMY+Lrzw==
zBnRazUUWCsrM5t0SEth
1z4R/XM98Wn3j1RMY+Lrzw==
h3b34yQL3cI8wg==
/+27PhUTzdWa
CO0jnOIoAC183w==
Cn8jz+pyZEfWCCBBFg==
jI4f4NnKFwoSUb4YbnkzePzLv+Sc0MoC
xZnrS1Y+5Sxv1g==
phjYsTTGW8zAMydj6tw=
v7JcJyW3x64phzOD99192J8=
tBJ+Uh3sJxYqbyvrfF6BKjsRZA==
xRTxyfuTgMhGxg==
6ceNTfir2qmQHtxWwqIrI8GQ7h/Te/A2CA==
00gVx7d5/U5soCdj6tw=
Jgvgt58H8MFLfBzTp1VZXCe2ZYg=
1NKRY1QTzdWa
ahmedo.ch
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2056 set thread context of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2520 set thread context of 1208 2520 SetupUtility.exe 20 PID 564 set thread context of 1208 564 explorer.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupUtility.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2520 SetupUtility.exe 2520 SetupUtility.exe 2520 SetupUtility.exe 2520 SetupUtility.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe 564 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2520 SetupUtility.exe 2520 SetupUtility.exe 2520 SetupUtility.exe 564 explorer.exe 564 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2520 SetupUtility.exe Token: SeDebugPrivilege 564 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 2056 wrote to memory of 2520 2056 808bc55dfd04bde28b5a81eeffa1be00N.exe 29 PID 1208 wrote to memory of 564 1208 Explorer.EXE 30 PID 1208 wrote to memory of 564 1208 Explorer.EXE 30 PID 1208 wrote to memory of 564 1208 Explorer.EXE 30 PID 1208 wrote to memory of 564 1208 Explorer.EXE 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\808bc55dfd04bde28b5a81eeffa1be00N.exe"C:\Users\Admin\AppData\Local\Temp\808bc55dfd04bde28b5a81eeffa1be00N.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:564
-