Analysis Overview
SHA256
8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b
Threat Level: Known bad
The file 8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe was found to be: Known bad.
Malicious Activity Summary
Formbook
Formbook payload
Suspicious use of SetThreadContext
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-29 01:47
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-29 01:47
Reported
2024-08-29 01:50
Platform
win7-20240708-en
Max time kernel
121s
Max time network
126s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1724 set thread context of 2704 | N/A | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe
"C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe"
C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe
"C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe"
C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe
"C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe"
Network
Files
memory/1724-0-0x000000007463E000-0x000000007463F000-memory.dmp
memory/1724-1-0x0000000000DC0000-0x0000000000E72000-memory.dmp
memory/1724-2-0x0000000074630000-0x0000000074D1E000-memory.dmp
memory/1724-3-0x0000000004DB0000-0x0000000004E54000-memory.dmp
memory/1724-4-0x00000000008B0000-0x00000000008C8000-memory.dmp
memory/1724-5-0x000000007463E000-0x000000007463F000-memory.dmp
memory/1724-6-0x0000000074630000-0x0000000074D1E000-memory.dmp
memory/1724-7-0x0000000004EF0000-0x0000000004F66000-memory.dmp
memory/2704-8-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2704-12-0x0000000000400000-0x000000000042F000-memory.dmp
memory/2704-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2704-9-0x0000000000400000-0x000000000042F000-memory.dmp
memory/1724-13-0x0000000074630000-0x0000000074D1E000-memory.dmp
memory/2704-14-0x00000000008D0000-0x0000000000BD3000-memory.dmp
memory/2704-15-0x00000000008D0000-0x0000000000BD3000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-29 01:47
Reported
2024-08-29 01:49
Platform
win10v2004-20240802-en
Max time kernel
130s
Max time network
115s
Command Line
Signatures
Formbook
Formbook payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3760 set thread context of 3472 | N/A | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe
"C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe"
C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe
"C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe"
C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe
"C:\Users\Admin\AppData\Local\Temp\8c92b39496a1f938d9c16ad3e1a7948b48923fd028e23a422c5bf8f0b7e1138b.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 147.142.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
Files
memory/3760-0-0x000000007516E000-0x000000007516F000-memory.dmp
memory/3760-1-0x0000000000B70000-0x0000000000C22000-memory.dmp
memory/3760-2-0x0000000005C80000-0x0000000006224000-memory.dmp
memory/3760-3-0x0000000005600000-0x0000000005692000-memory.dmp
memory/3760-4-0x00000000057D0000-0x00000000057DA000-memory.dmp
memory/3760-5-0x0000000075160000-0x0000000075910000-memory.dmp
memory/3760-6-0x0000000006CA0000-0x0000000006D44000-memory.dmp
memory/3760-7-0x0000000005C30000-0x0000000005C48000-memory.dmp
memory/3760-8-0x000000007516E000-0x000000007516F000-memory.dmp
memory/3760-9-0x0000000075160000-0x0000000075910000-memory.dmp
memory/3760-10-0x0000000006830000-0x00000000068A6000-memory.dmp
memory/3760-11-0x00000000090B0000-0x000000000914C000-memory.dmp
memory/3472-12-0x0000000000400000-0x000000000042F000-memory.dmp
memory/3760-14-0x0000000075160000-0x0000000075910000-memory.dmp
memory/3472-15-0x00000000011D0000-0x000000000151A000-memory.dmp