Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe
Resource
win7-20240708-en
General
-
Target
633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe
-
Size
1.1MB
-
MD5
3e2da7be0bae852fd8be27e3b0b2c5e6
-
SHA1
134e1f6951393ebe1037361d03a395231da2db99
-
SHA256
633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a
-
SHA512
823e77f4a8d51adbb264bac1cda48dd16e2bb0d429033c9a94d272558e8d7e7ab53df4def20fdf50b3f9b6f64c8d1aa5cbdc65e0f6214cba2263817ff9a3af5d
-
SSDEEP
24576:DqDEvCTbMWu7rQYlBQcBiT6rprG8ajPa7PUv8l:DTvC/MTQYxsWR7ajI
Malware Config
Extracted
formbook
4.1
pt46
twinportslocal.com
rovor.store
98169.club
mdywl.com
jrd3s.rest
aston1717.top
floridawoodworkingmachinery.com
17tk555t.com
ankitsho.shop
seclameh.com
realrecordlabel.com
trenchonbirmingham.com
af28.top
rtp1kenzototo.com
theselflovesite.com
promotegetpaid.info
strategiclogisticsagency.com
learneracademy.net
per-watch.com
betbox2341.com
22958.xyz
birthdaywishestexts.com
nihilculturamail.com
vasymaman.com
evriukpostaes.sbs
winkingbots.com
cb214.pro
osakanacreation.com
kingchuxing.com
dr-cotton.net
iiixc759q.xyz
eraplay88rtpgacor.lat
wguujb.com
dental-implants-89083.bond
liposuction-89237.bond
harbalmaizik.com
seoservicesdelhi.net
fakefox.xyz
wimetimephotos.com
healthsaveplus.com
wvufcw948o.top
dieselrockpartners.com
istchannelnet.com
123moviesonl.com
arlatwestern.shop
cloudproduction.cloud
gv3l1.vip
casino-x-zerkalo27pm.xyz
serverdayz.com
dvdripguides.com
vitalfitness.site
c21candacedevillier.com
gory12.online
0452frl.com
escpethemtrix.top
koumimi.tech
me29hs38g1.com
dreziuy.xyz
uddyen.shop
asia76s.xyz
melliccine.com
olxelang.com
paincareathome.com
sliveringaf.christmas
wheresthechocolateat.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/772-12-0x0000000000640000-0x000000000066F000-memory.dmp formbook behavioral2/memory/772-16-0x0000000000640000-0x000000000066F000-memory.dmp formbook behavioral2/memory/772-20-0x0000000000640000-0x000000000066F000-memory.dmp formbook behavioral2/memory/8-27-0x00000000007B0000-0x00000000007DF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4276 set thread context of 772 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 92 PID 772 set thread context of 3400 772 svchost.exe 55 PID 772 set thread context of 3400 772 svchost.exe 55 PID 8 set thread context of 3400 8 rundll32.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 772 svchost.exe 772 svchost.exe 772 svchost.exe 772 svchost.exe 772 svchost.exe 772 svchost.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe 8 rundll32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 772 svchost.exe 772 svchost.exe 772 svchost.exe 772 svchost.exe 8 rundll32.exe 8 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 772 svchost.exe Token: SeDebugPrivilege 8 rundll32.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3400 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4276 wrote to memory of 772 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 92 PID 4276 wrote to memory of 772 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 92 PID 4276 wrote to memory of 772 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 92 PID 4276 wrote to memory of 772 4276 633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe 92 PID 3400 wrote to memory of 8 3400 Explorer.EXE 95 PID 3400 wrote to memory of 8 3400 Explorer.EXE 95 PID 3400 wrote to memory of 8 3400 Explorer.EXE 95 PID 8 wrote to memory of 5048 8 rundll32.exe 96 PID 8 wrote to memory of 5048 8 rundll32.exe 96 PID 8 wrote to memory of 5048 8 rundll32.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe"C:\Users\Admin\AppData\Local\Temp\633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\633defdc371a3cfd3641fd09c17ed6c0c9b8634ddb8d2de5c24a9393ac37e05a.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-