Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
New Al Maktoum International Airport Enquiry Ref #2401249.exe
Resource
win7-20240705-en
General
-
Target
New Al Maktoum International Airport Enquiry Ref #2401249.exe
-
Size
1.1MB
-
MD5
621c253a4d715e3af16fe8be2fdd8cb1
-
SHA1
68ce09cc59887c7f9649f22e6688028957d6c55e
-
SHA256
007c997b49ac0889e71757762c82432a975a273eda4c871acec3c0823c6ea530
-
SHA512
56616c4175b53f6b00591e7aa5d32146fb168de7a22501c9fd784a0ccc5d403b5b920f01f3545cceab9ea0dd0cc5df992d339bed6a838e930094f35782bc4fa6
-
SSDEEP
24576:TAHnh+eWsN3skA4RV1Hom2KXMmHaIxs0ZkXe9VHdA5:eh+ZkldoPK8YaIxIe9O
Malware Config
Extracted
formbook
4.1
pt46
twinportslocal.com
rovor.store
98169.club
mdywl.com
jrd3s.rest
aston1717.top
floridawoodworkingmachinery.com
17tk555t.com
ankitsho.shop
seclameh.com
realrecordlabel.com
trenchonbirmingham.com
af28.top
rtp1kenzototo.com
theselflovesite.com
promotegetpaid.info
strategiclogisticsagency.com
learneracademy.net
per-watch.com
betbox2341.com
22958.xyz
birthdaywishestexts.com
nihilculturamail.com
vasymaman.com
evriukpostaes.sbs
winkingbots.com
cb214.pro
osakanacreation.com
kingchuxing.com
dr-cotton.net
iiixc759q.xyz
eraplay88rtpgacor.lat
wguujb.com
dental-implants-89083.bond
liposuction-89237.bond
harbalmaizik.com
seoservicesdelhi.net
fakefox.xyz
wimetimephotos.com
healthsaveplus.com
wvufcw948o.top
dieselrockpartners.com
istchannelnet.com
123moviesonl.com
arlatwestern.shop
cloudproduction.cloud
gv3l1.vip
casino-x-zerkalo27pm.xyz
serverdayz.com
dvdripguides.com
vitalfitness.site
c21candacedevillier.com
gory12.online
0452frl.com
escpethemtrix.top
koumimi.tech
me29hs38g1.com
dreziuy.xyz
uddyen.shop
asia76s.xyz
melliccine.com
olxelang.com
paincareathome.com
sliveringaf.christmas
wheresthechocolateat.com
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1148-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1148-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1148-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1316 set thread context of 1148 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 87 PID 1148 set thread context of 3488 1148 svchost.exe 56 PID 1148 set thread context of 3488 1148 svchost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Al Maktoum International Airport Enquiry Ref #2401249.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe 1148 svchost.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 1148 svchost.exe 1148 svchost.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1148 svchost.exe Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 3488 Explorer.EXE 3488 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1148 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 87 PID 1316 wrote to memory of 1148 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 87 PID 1316 wrote to memory of 1148 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 87 PID 1316 wrote to memory of 1148 1316 New Al Maktoum International Airport Enquiry Ref #2401249.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\New Al Maktoum International Airport Enquiry Ref #2401249.exe"C:\Users\Admin\AppData\Local\Temp\New Al Maktoum International Airport Enquiry Ref #2401249.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\New Al Maktoum International Airport Enquiry Ref #2401249.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-