Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
CopyMX2N79.exe
Resource
win7-20240704-en
General
-
Target
CopyMX2N79.exe
-
Size
695KB
-
MD5
c02762dd741807fe5db17e96c29448a1
-
SHA1
0b1c135bc1c956c05b3962be6ec79cb44e29ba1d
-
SHA256
02296010035b93a3435b5b06a9af1f2715310bcf370918cd80114b18fae780b6
-
SHA512
82d469577a2c30554d1b083b5ae214cd3c4737ef7555922b5b6666232d2aa26236a499c257370e5b20e82e0fb213968d90b383b7688affa413d255c3a42c327f
-
SSDEEP
12288:ORZAplT4AWrNlqpANwJy1nfqzhd/sPxd++rOb:UAzT4AWrbqpAx8gLRrOb
Malware Config
Extracted
formbook
4.0
3iw
cepbank-direkt.com
lieoga.com
officialbetterbeardclub.com
media0702.com
safariflorist.com
vipinternationalinc.com
bitechanalytics.com
employeewage.com
truckingtag.com
priyaladiestailor.com
highlanderpiping.com
enargiapetroleum.com
vermilionranch.com
focusopgeld.com
kalem-euy.net
disypen.com
fairpayva.com
davidguner.com
idreferensi.com
dytt889.com
schuada.com
minimalistvineyards.com
qduola.com
creditoefectivo.info
healthynaturalbirthcontrol.com
work-from-home-today.com
xn--p5t311d5zvmga.com
ex1x.com
onsitelogistics123.net
yilingshenghuo.net
cddlmixer.com
libero-networks.net
hillsidesunshine.com
whanaruabayholidaypark.com
pfog.ltd
thelifewaykefir.com
italotranslations.com
zhaojianhua.net
coralkw.com
e-learning-studios.com
technicalworld.online
raiseyourcross.com
fromwheretohere.com
ducati-world24.com
tag.loans
fast-bank.com
njssnt.com
crypto-exch.com
178416.com
glorybeegarden.com
whistleblowerchasealayne.com
hikmetamca.com
cjnexgift.com
simorghcard.com
thebestofsecrets.com
803manbetx.com
valodokan.com
sacpropertysale.com
paintwithdrink.com
ikidpass.com
setappointments.online
keymatic-eg.com
lookappdev.com
starbuckranchtx.com
regulars6.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4452-11-0x0000000000400000-0x000000000042D000-memory.dmp formbook behavioral2/memory/4452-16-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4352 set thread context of 4452 4352 CopyMX2N79.exe 110 PID 4452 set thread context of 3540 4452 CopyMX2N79.exe 56 PID 2964 set thread context of 3540 2964 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CopyMX2N79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4352 CopyMX2N79.exe 4352 CopyMX2N79.exe 4352 CopyMX2N79.exe 4352 CopyMX2N79.exe 4352 CopyMX2N79.exe 4352 CopyMX2N79.exe 4352 CopyMX2N79.exe 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe 2964 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 4452 CopyMX2N79.exe 2964 wlanext.exe 2964 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4352 CopyMX2N79.exe Token: SeDebugPrivilege 4452 CopyMX2N79.exe Token: SeDebugPrivilege 2964 wlanext.exe Token: SeShutdownPrivilege 3540 Explorer.EXE Token: SeCreatePagefilePrivilege 3540 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3540 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4368 4352 CopyMX2N79.exe 109 PID 4352 wrote to memory of 4368 4352 CopyMX2N79.exe 109 PID 4352 wrote to memory of 4368 4352 CopyMX2N79.exe 109 PID 4352 wrote to memory of 4452 4352 CopyMX2N79.exe 110 PID 4352 wrote to memory of 4452 4352 CopyMX2N79.exe 110 PID 4352 wrote to memory of 4452 4352 CopyMX2N79.exe 110 PID 4352 wrote to memory of 4452 4352 CopyMX2N79.exe 110 PID 4352 wrote to memory of 4452 4352 CopyMX2N79.exe 110 PID 4352 wrote to memory of 4452 4352 CopyMX2N79.exe 110 PID 3540 wrote to memory of 2964 3540 Explorer.EXE 111 PID 3540 wrote to memory of 2964 3540 Explorer.EXE 111 PID 3540 wrote to memory of 2964 3540 Explorer.EXE 111 PID 2964 wrote to memory of 1300 2964 wlanext.exe 112 PID 2964 wrote to memory of 1300 2964 wlanext.exe 112 PID 2964 wrote to memory of 1300 2964 wlanext.exe 112
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"{path}"3⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\CopyMX2N79.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4440,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:81⤵PID:4868