Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
PROJECT FEJ-1601.exe
Resource
win7-20240708-en
General
-
Target
PROJECT FEJ-1601.exe
-
Size
394KB
-
MD5
212f0a0a7237ab09c82f6153361ac1b0
-
SHA1
1b84fff6041a1700f34c80a6e737e8e8c80d5770
-
SHA256
40bec545f9b01c4438a75cb03d902cc70c65ce8ecf90ecb1fb88aeb00b2c92cc
-
SHA512
232d6573a5801af940f13f97adae7f6d7a7cd38a3b61b190437f666387508db5668df77db980de3b911e2dab806587f9a486ccab5887a50f27efabb538ade348
-
SSDEEP
12288:U1zgVlrWHFZED24Ug/Q50b4Qhw+hjcnUgtICxs3IEeC:U1zgVlrWHwi4+5Y4WzhjcnUgXpE
Malware Config
Extracted
formbook
4.1
ykj
polovnitelefoni.net
cateless.com
newbeginnings.club
quanghoagroup.com
pcbet0.com
normal.computer
yoinkyoink.com
lahorekabob.com
charnal-voices.com
hotsleepspot.com
thekashmirfabrics.com
upholsteryormondbeach.com
caramel-lefilm.com
pkitales.com
truancyclub.com
susanmathason.com
sweetlimenail.com
vaaudiotechnic.site
edem-agency.com
rakkonoteineinakurashi.com
strukkbizworldonline.com
viladas.com
kevinhoffmanart.com
auroyaumedecire.com
blueskyserv.com
spaatoola.com
estoicoboliviano.com
parkinlotpimpin.com
citymantis.com
lifefrugal.com
kew-uxdesign.com
higstyle.com
hutsonfamilyinsurance.com
innovativlabor.com
organicmobiletanning.com
parmansercon.com
marktplaatsaccount.info
bldh666.com
townelegal.com
babyscornerstore.com
xinanc.com
mycampussigns.com
bakldx.com
ylwdog.com
emagrecercomhiit.com
signefi.com
testproconsulting.com
parkerfeedco.com
frostox.com
filmtencent.club
bambooglobalstore.com
islamoradakeyflorist.com
haohanvolam.com
velonesveleza.com
infomezzo.com
rorotanitim.com
360steve.com
smarteryou6d7.club
gpstecnologiamotriz.com
wvmcoop.com
sectarism-multiplied.info
kqnouwj.com
maddfella.com
jiangsufeiyue.com
farrsideofleadership.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/4536-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/4536-17-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4428 set thread context of 4536 4428 PROJECT FEJ-1601.exe 99 PID 4536 set thread context of 3472 4536 PROJECT FEJ-1601.exe 56 PID 1172 set thread context of 3472 1172 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROJECT FEJ-1601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 4428 PROJECT FEJ-1601.exe 4428 PROJECT FEJ-1601.exe 4428 PROJECT FEJ-1601.exe 4536 PROJECT FEJ-1601.exe 4536 PROJECT FEJ-1601.exe 4536 PROJECT FEJ-1601.exe 4536 PROJECT FEJ-1601.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe 1172 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4536 PROJECT FEJ-1601.exe 4536 PROJECT FEJ-1601.exe 4536 PROJECT FEJ-1601.exe 1172 cmmon32.exe 1172 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4428 PROJECT FEJ-1601.exe Token: SeDebugPrivilege 4536 PROJECT FEJ-1601.exe Token: SeDebugPrivilege 1172 cmmon32.exe Token: SeShutdownPrivilege 3472 Explorer.EXE Token: SeCreatePagefilePrivilege 3472 Explorer.EXE Token: SeShutdownPrivilege 3472 Explorer.EXE Token: SeCreatePagefilePrivilege 3472 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3472 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4428 wrote to memory of 4500 4428 PROJECT FEJ-1601.exe 98 PID 4428 wrote to memory of 4500 4428 PROJECT FEJ-1601.exe 98 PID 4428 wrote to memory of 4500 4428 PROJECT FEJ-1601.exe 98 PID 4428 wrote to memory of 4536 4428 PROJECT FEJ-1601.exe 99 PID 4428 wrote to memory of 4536 4428 PROJECT FEJ-1601.exe 99 PID 4428 wrote to memory of 4536 4428 PROJECT FEJ-1601.exe 99 PID 4428 wrote to memory of 4536 4428 PROJECT FEJ-1601.exe 99 PID 4428 wrote to memory of 4536 4428 PROJECT FEJ-1601.exe 99 PID 4428 wrote to memory of 4536 4428 PROJECT FEJ-1601.exe 99 PID 3472 wrote to memory of 1172 3472 Explorer.EXE 100 PID 3472 wrote to memory of 1172 3472 Explorer.EXE 100 PID 3472 wrote to memory of 1172 3472 Explorer.EXE 100 PID 1172 wrote to memory of 3760 1172 cmmon32.exe 101 PID 1172 wrote to memory of 3760 1172 cmmon32.exe 101 PID 1172 wrote to memory of 3760 1172 cmmon32.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"3⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PROJECT FEJ-1601.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-