Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 08:24
Static task
static1
Behavioral task
behavioral1
Sample
808bc55dfd04bde28b5a81eeffa1be00N.exe
Resource
win7-20240704-en
General
-
Target
808bc55dfd04bde28b5a81eeffa1be00N.exe
-
Size
1.7MB
-
MD5
808bc55dfd04bde28b5a81eeffa1be00
-
SHA1
1ac47e1d51466f5031b1096d40816abb90d36668
-
SHA256
1968771402227e2db604f63085104459de416107146f4d21a50c6e6e866f4324
-
SHA512
e8b2d3e05adcb2da69780f1a4cea88c7f830d9d9d3a41abacc2cdf22b06ed5992a77a61e142c2622e210bd981fa20f710183aa2efa164b60d3c6aaed4f227c59
-
SSDEEP
24576:0G/gSI7uzvdh53ATay0Lu9fE124K2Gzo/Xyhp4HtNLpTGLRvO4x:dgruLMayJWao/XC6B
Malware Config
Extracted
formbook
dcn0
ZVx68vDtAMBCwg==
oBMBvsNORkM/O/ox
Ff9pISWkm6eG4lByIspp
c2T42c6CIIF6B8xTxm9XzpVw
bvjhxRbnAC183w==
0lTttSNG4HUDNflyIspp
hPXFlstqiHA/O/ox
WLR+MeerxZ0cNn1ja+IQAYo=
IHRn4xXOVKi477zarG+ObSy7YJA=
Xhf3e+tdAC183w==
Xk0ZAezv2rWH
kngo+vBeSRN7AszNwam3Osmguuqc0MoC
a2Qp7a+E8fSw7LDjpnqEKjsRZA==
3zjy4E7+QM48wg==
YcCmqT3OUNAigVott2pBKiy7YJA=
4+SMeX1juat/5cZ1AZihcyy7YJA=
/+m7sro0OBTl3TMpCw==
i2ctEfe4//a64yklMsgS2J90
+loZ2QKGX0UWgpvErMs=
b9BNCnJWQJS8IfsR0uR3bCy7YJA=
9eiUYE0ynHE/O/ox
F2/75pOIYNg0hzOD99192J8=
Y1xOONdO105okfha33EZ2A==
qYZIIB+dfF0wp1nVWFz067hJ2/qoXEVeAA==
moQMzat7tfKyKPYs
aMZJI/NfUSSpPQUBJ8/11g==
QKMN15GjpHcpyA==
6+S1hTvphhFfoCdj6tw=
DPynhWcnZWho7a0p33EZ2A==
EXY//zDm7ej3Guwo
PSWxPYkk0SNioSdj6tw=
jv+tmhv1ySZloydj6tw=
P8GUV5BhNZflCCBBFg==
IQZ0PWog1lcVVkJYHg==
aOTCq/Cet6AdhSdj6tw=
OBzJrqYS+eac46nZo4aI84kWMEtH
kBzTkbI2LTo/O/ox
a8pwOrU/tyx93a/QrGBpXGQIfZI=
GWoC9K5Mx0GR34urFcDPyQ==
dGxKGM2FI4iAkTOD99192J8=
UqQv8Vkx7WzkCCBBFg==
NcBsPK+YmdZP0cyhY+Lrzw==
zcKbk5oK7NCgFOpa4tHv0g==
uIomFkUTzdWa
QkAF8NuWMZmnPjCFgJBa+Y1t
51w6Gw7c3NyY
IyDnsW89dXaMrAxotF8jGZc=
1s1RHCrCwI8PnVhMY+Lrzw==
zBnRazUUWCsrM5t0SEth
1z4R/XM98Wn3j1RMY+Lrzw==
h3b34yQL3cI8wg==
/+27PhUTzdWa
CO0jnOIoAC183w==
Cn8jz+pyZEfWCCBBFg==
jI4f4NnKFwoSUb4YbnkzePzLv+Sc0MoC
xZnrS1Y+5Sxv1g==
phjYsTTGW8zAMydj6tw=
v7JcJyW3x64phzOD99192J8=
tBJ+Uh3sJxYqbyvrfF6BKjsRZA==
xRTxyfuTgMhGxg==
6ceNTfir2qmQHtxWwqIrI8GQ7h/Te/A2CA==
00gVx7d5/U5soCdj6tw=
Jgvgt58H8MFLfBzTp1VZXCe2ZYg=
1NKRY1QTzdWa
ahmedo.ch
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3760 set thread context of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 2272 set thread context of 3432 2272 AddInProcess32.exe 56 PID 3756 set thread context of 3432 3756 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
description ioc Process Key created \Registry\User\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2272 AddInProcess32.exe 2272 AddInProcess32.exe 2272 AddInProcess32.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe 3756 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe Token: SeDebugPrivilege 2272 AddInProcess32.exe Token: SeDebugPrivilege 3756 wlanext.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3760 wrote to memory of 432 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 86 PID 3760 wrote to memory of 432 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 86 PID 3760 wrote to memory of 4828 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 87 PID 3760 wrote to memory of 4828 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 87 PID 3760 wrote to memory of 4396 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 88 PID 3760 wrote to memory of 4396 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 88 PID 3760 wrote to memory of 116 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 90 PID 3760 wrote to memory of 116 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 90 PID 3760 wrote to memory of 3308 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 91 PID 3760 wrote to memory of 3308 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 91 PID 3760 wrote to memory of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 3760 wrote to memory of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 3760 wrote to memory of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 3760 wrote to memory of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 3760 wrote to memory of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 3760 wrote to memory of 2272 3760 808bc55dfd04bde28b5a81eeffa1be00N.exe 92 PID 3432 wrote to memory of 3756 3432 Explorer.EXE 93 PID 3432 wrote to memory of 3756 3432 Explorer.EXE 93 PID 3432 wrote to memory of 3756 3432 Explorer.EXE 93 PID 3756 wrote to memory of 4364 3756 wlanext.exe 104 PID 3756 wrote to memory of 4364 3756 wlanext.exe 104 PID 3756 wrote to memory of 4364 3756 wlanext.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\808bc55dfd04bde28b5a81eeffa1be00N.exe"C:\Users\Admin\AppData\Local\Temp\808bc55dfd04bde28b5a81eeffa1be00N.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"3⤵PID:432
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"3⤵PID:4828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"3⤵PID:4396
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"3⤵PID:116
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"3⤵PID:3308
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4364
-
-