Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 20:24
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20240903-en
General
-
Target
2.exe
-
Size
185KB
-
MD5
cb90c75f8cbbbcc3f74ee22288c800a1
-
SHA1
1c84ad88465e6eb1b91dfaf099bf2697e44ccc0d
-
SHA256
b3d45d85cba27f6900215868e9e6e9a97fb95648a42396305cd8bcb50c8e80d0
-
SHA512
22e8fd5f34e92ffb92e362efdc3866c9bfab68a5f6f463f64ae4f16876722dd4595e0cff34f970dd87140859b58e6acdb20c8b82f27ed42bbf7cc80f46e7a314
-
SSDEEP
3072:8MHDFaMPRIjxWcy4C9y30XclW6Qilinp0fJ4XNZkAC581h/dgHG0uD1X4/qZa:e7UL4Co3js6QilinA4XN+zKh/uG0u5XC
Malware Config
Extracted
formbook
4.1
l26n
vtxapg.bond
iscussatthetable.net
q5b2.vip
urculturalbuzz.buzz
0xfulisuo.xyz
iz-kyc.online
atladies4kamala.vote
aison-maison.xyz
codom73.online
aosecurity.online
szxart.xyz
ergecast.net
ealker.pro
hickensforkfc.net
ldoradocasino-uee.top
afiqgroup.net
ercania.net
sdc.ngo
raphic-design-degree-37012.bond
888yl123.vip
fipertsales.online
o9ht6yn.baby
arutoto.net
oasdpyreasoonjop.cloud
aitowarna4d.info
exhost.online
nboxers.xyz
arlosurquiza.online
400725rfcwhnl588.top
esponserateraisers.xyz
mail-marketing-18153.bond
5jfpn13.xyz
ental-bridges-47950.bond
awn-mower-72655.bond
l-pvc-floor-comments-25j.today
indmix.net
hc-coop.net
uywr.info
eauty-services-us-1812922.live
avid87chdz.dev
ikdown.online
oanweb.today
as-grills-01010.bond
acking-jobs-17244.bond
nlinepmpcourses.today
heikh.website
8463.photo
rsac.fun
20177.pink
tirz8.digital
herapy-centers-70897.bond
hark42.online
ubisite.xyz
sli-susuvegan.asia
laypokerdom.world
hantienquocgia24hs.online
iveniu.top
55525.club
nternallybeautiful.net
milelab.pro
zzurri.team
etworkcenterhome8.dev
agar-taxa-2024.online
iveswing.xyz
atiana-gadalka.online
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2160-2-0x0000000000FB0000-0x0000000000FDF000-memory.dmp formbook behavioral1/memory/1164-6-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2264 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2160 set thread context of 1216 2160 2.exe 21 PID 1164 set thread context of 1216 1164 NAPSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2160 2.exe 2160 2.exe 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2160 2.exe 2160 2.exe 2160 2.exe 1164 NAPSTAT.EXE 1164 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2160 2.exe Token: SeDebugPrivilege 1164 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1164 1216 Explorer.EXE 30 PID 1216 wrote to memory of 1164 1216 Explorer.EXE 30 PID 1216 wrote to memory of 1164 1216 Explorer.EXE 30 PID 1216 wrote to memory of 1164 1216 Explorer.EXE 30 PID 1164 wrote to memory of 2264 1164 NAPSTAT.EXE 31 PID 1164 wrote to memory of 2264 1164 NAPSTAT.EXE 31 PID 1164 wrote to memory of 2264 1164 NAPSTAT.EXE 31 PID 1164 wrote to memory of 2264 1164 NAPSTAT.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2264
-
-