Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
LPO 92558 & 92669.exe
Resource
win7-20240704-en
General
-
Target
LPO 92558 & 92669.exe
-
Size
607KB
-
MD5
690b2cd2a36fa7511b2d935a1efdc47f
-
SHA1
588f35c534c2ed93368446a25dde5f964119119f
-
SHA256
a68bc9acb795949fa2d0ee4a4ea0d7242ed87c9a3017af29a8bca49e6814ae37
-
SHA512
5c96a1de338f2994693d0316e72a287ef0001926ca6a24d436d07d7d4e9c381a3bc1226cf567c16f5f600cd2b472130822798dd00ca9cfde09e4257c062db9ff
-
SSDEEP
12288:tVVln+HKifVQp+l3qRzNFCRZpUEmTITBDnjgqwEi87wruW:5dCKwQpM3wZIHUypjgqri87+uW
Malware Config
Extracted
formbook
4.1
hc58
reunioncoins.com
slot88win.today
diamondcarp.com
poke138.site
cratermaketing.com
mutokiva.website
thstocks5.online
openaquasurge.com
prodsdigital.com
exileescape.com
iqcjuetaudtj.com
bwexhaustprofl.com
indiglobalconnect.com
pushkeyclub.com
stephvin.top
lifebione.com
hannahmegery.com
brookchivell.com
bioskyline.com
nonprofitgrants.online
dhfldhs007.com
horizonlegalservices.com
suhanszki.com
royacinnamon.com
eastcarolinaapartments.com
6jo-aqua.com
valemoda.shop
nettasfl.com
appgo88a.info
ajun455678.club
homehearthco.com
newrica.net
b8226.vip
theleonlegacy.com
smnwa.net
brightwayentertainment.net
ntitnet.com
emfblockage.com
latinopridereport.com
lensreadylooks.com
dijvhy.cfd
96722app.com
xoflaire.com
buiptr.com
clepets.com
sympathyforthedeli.com
zzxxxfxb.xyz
artificial-ace.com
neonabby.net
africanventuresvolunteering.com
the-jokers.com
opjauz.cfd
work-abroad-37879.bond
freekmagazine.com
work-abroad-27757.bond
karaokeboats.com
ro-news.site
96b52.net
texasschooltraining.com
coincentral.info
spacezaim.site
2016euro.net
parkxcity.com
ylhg779.com
abacuzz.dev
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2464-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2464-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4848-21-0x0000000000950000-0x000000000097F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3364 set thread context of 2464 3364 LPO 92558 & 92669.exe 94 PID 2464 set thread context of 3524 2464 LPO 92558 & 92669.exe 56 PID 4848 set thread context of 3524 4848 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LPO 92558 & 92669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3364 LPO 92558 & 92669.exe 3364 LPO 92558 & 92669.exe 2464 LPO 92558 & 92669.exe 2464 LPO 92558 & 92669.exe 2464 LPO 92558 & 92669.exe 2464 LPO 92558 & 92669.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe 4848 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2464 LPO 92558 & 92669.exe 2464 LPO 92558 & 92669.exe 2464 LPO 92558 & 92669.exe 4848 help.exe 4848 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3364 LPO 92558 & 92669.exe Token: SeDebugPrivilege 2464 LPO 92558 & 92669.exe Token: SeDebugPrivilege 4848 help.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3524 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3364 wrote to memory of 4152 3364 LPO 92558 & 92669.exe 93 PID 3364 wrote to memory of 4152 3364 LPO 92558 & 92669.exe 93 PID 3364 wrote to memory of 4152 3364 LPO 92558 & 92669.exe 93 PID 3364 wrote to memory of 2464 3364 LPO 92558 & 92669.exe 94 PID 3364 wrote to memory of 2464 3364 LPO 92558 & 92669.exe 94 PID 3364 wrote to memory of 2464 3364 LPO 92558 & 92669.exe 94 PID 3364 wrote to memory of 2464 3364 LPO 92558 & 92669.exe 94 PID 3364 wrote to memory of 2464 3364 LPO 92558 & 92669.exe 94 PID 3364 wrote to memory of 2464 3364 LPO 92558 & 92669.exe 94 PID 3524 wrote to memory of 4848 3524 Explorer.EXE 95 PID 3524 wrote to memory of 4848 3524 Explorer.EXE 95 PID 3524 wrote to memory of 4848 3524 Explorer.EXE 95 PID 4848 wrote to memory of 1088 4848 help.exe 96 PID 4848 wrote to memory of 1088 4848 help.exe 96 PID 4848 wrote to memory of 1088 4848 help.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"3⤵PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\LPO 92558 & 92669.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1088
-
-