Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
CopyMX2N79.exe
Resource
win7-20240704-en
General
-
Target
CopyMX2N79.exe
-
Size
695KB
-
MD5
c02762dd741807fe5db17e96c29448a1
-
SHA1
0b1c135bc1c956c05b3962be6ec79cb44e29ba1d
-
SHA256
02296010035b93a3435b5b06a9af1f2715310bcf370918cd80114b18fae780b6
-
SHA512
82d469577a2c30554d1b083b5ae214cd3c4737ef7555922b5b6666232d2aa26236a499c257370e5b20e82e0fb213968d90b383b7688affa413d255c3a42c327f
-
SSDEEP
12288:ORZAplT4AWrNlqpANwJy1nfqzhd/sPxd++rOb:UAzT4AWrbqpAx8gLRrOb
Malware Config
Extracted
formbook
4.0
3iw
cepbank-direkt.com
lieoga.com
officialbetterbeardclub.com
media0702.com
safariflorist.com
vipinternationalinc.com
bitechanalytics.com
employeewage.com
truckingtag.com
priyaladiestailor.com
highlanderpiping.com
enargiapetroleum.com
vermilionranch.com
focusopgeld.com
kalem-euy.net
disypen.com
fairpayva.com
davidguner.com
idreferensi.com
dytt889.com
schuada.com
minimalistvineyards.com
qduola.com
creditoefectivo.info
healthynaturalbirthcontrol.com
work-from-home-today.com
xn--p5t311d5zvmga.com
ex1x.com
onsitelogistics123.net
yilingshenghuo.net
cddlmixer.com
libero-networks.net
hillsidesunshine.com
whanaruabayholidaypark.com
pfog.ltd
thelifewaykefir.com
italotranslations.com
zhaojianhua.net
coralkw.com
e-learning-studios.com
technicalworld.online
raiseyourcross.com
fromwheretohere.com
ducati-world24.com
tag.loans
fast-bank.com
njssnt.com
crypto-exch.com
178416.com
glorybeegarden.com
whistleblowerchasealayne.com
hikmetamca.com
cjnexgift.com
simorghcard.com
thebestofsecrets.com
803manbetx.com
valodokan.com
sacpropertysale.com
paintwithdrink.com
ikidpass.com
setappointments.online
keymatic-eg.com
lookappdev.com
starbuckranchtx.com
regulars6.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2616-13-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2616-17-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral1/memory/2616-21-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1096 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2712 set thread context of 2616 2712 CopyMX2N79.exe 30 PID 2616 set thread context of 1412 2616 CopyMX2N79.exe 21 PID 2616 set thread context of 1412 2616 CopyMX2N79.exe 21 PID 1968 set thread context of 1412 1968 wininit.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CopyMX2N79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CopyMX2N79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2712 CopyMX2N79.exe 2712 CopyMX2N79.exe 2712 CopyMX2N79.exe 2712 CopyMX2N79.exe 2616 CopyMX2N79.exe 2616 CopyMX2N79.exe 2616 CopyMX2N79.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe 1968 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2616 CopyMX2N79.exe 2616 CopyMX2N79.exe 2616 CopyMX2N79.exe 2616 CopyMX2N79.exe 1968 wininit.exe 1968 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2712 CopyMX2N79.exe Token: SeDebugPrivilege 2616 CopyMX2N79.exe Token: SeDebugPrivilege 1968 wininit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2712 wrote to memory of 2616 2712 CopyMX2N79.exe 30 PID 2616 wrote to memory of 1968 2616 CopyMX2N79.exe 31 PID 2616 wrote to memory of 1968 2616 CopyMX2N79.exe 31 PID 2616 wrote to memory of 1968 2616 CopyMX2N79.exe 31 PID 2616 wrote to memory of 1968 2616 CopyMX2N79.exe 31 PID 1968 wrote to memory of 1096 1968 wininit.exe 32 PID 1968 wrote to memory of 1096 1968 wininit.exe 32 PID 1968 wrote to memory of 1096 1968 wininit.exe 32 PID 1968 wrote to memory of 1096 1968 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
-