Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 20:24
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20240903-en
General
-
Target
2.exe
-
Size
185KB
-
MD5
cb90c75f8cbbbcc3f74ee22288c800a1
-
SHA1
1c84ad88465e6eb1b91dfaf099bf2697e44ccc0d
-
SHA256
b3d45d85cba27f6900215868e9e6e9a97fb95648a42396305cd8bcb50c8e80d0
-
SHA512
22e8fd5f34e92ffb92e362efdc3866c9bfab68a5f6f463f64ae4f16876722dd4595e0cff34f970dd87140859b58e6acdb20c8b82f27ed42bbf7cc80f46e7a314
-
SSDEEP
3072:8MHDFaMPRIjxWcy4C9y30XclW6Qilinp0fJ4XNZkAC581h/dgHG0uD1X4/qZa:e7UL4Co3js6QilinA4XN+zKh/uG0u5XC
Malware Config
Extracted
formbook
4.1
l26n
vtxapg.bond
iscussatthetable.net
q5b2.vip
urculturalbuzz.buzz
0xfulisuo.xyz
iz-kyc.online
atladies4kamala.vote
aison-maison.xyz
codom73.online
aosecurity.online
szxart.xyz
ergecast.net
ealker.pro
hickensforkfc.net
ldoradocasino-uee.top
afiqgroup.net
ercania.net
sdc.ngo
raphic-design-degree-37012.bond
888yl123.vip
fipertsales.online
o9ht6yn.baby
arutoto.net
oasdpyreasoonjop.cloud
aitowarna4d.info
exhost.online
nboxers.xyz
arlosurquiza.online
400725rfcwhnl588.top
esponserateraisers.xyz
mail-marketing-18153.bond
5jfpn13.xyz
ental-bridges-47950.bond
awn-mower-72655.bond
l-pvc-floor-comments-25j.today
indmix.net
hc-coop.net
uywr.info
eauty-services-us-1812922.live
avid87chdz.dev
ikdown.online
oanweb.today
as-grills-01010.bond
acking-jobs-17244.bond
nlinepmpcourses.today
heikh.website
8463.photo
rsac.fun
20177.pink
tirz8.digital
herapy-centers-70897.bond
hark42.online
ubisite.xyz
sli-susuvegan.asia
laypokerdom.world
hantienquocgia24hs.online
iveniu.top
55525.club
nternallybeautiful.net
milelab.pro
zzurri.team
etworkcenterhome8.dev
agar-taxa-2024.online
iveswing.xyz
atiana-gadalka.online
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/460-2-0x0000000000630000-0x000000000065F000-memory.dmp formbook behavioral2/memory/1040-6-0x0000000000980000-0x00000000009AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 460 set thread context of 3544 460 2.exe 56 PID 1040 set thread context of 3544 1040 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 460 2.exe 460 2.exe 460 2.exe 460 2.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe 1040 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 460 2.exe 460 2.exe 460 2.exe 1040 cscript.exe 1040 cscript.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 460 2.exe Token: SeShutdownPrivilege 3544 Explorer.EXE Token: SeCreatePagefilePrivilege 3544 Explorer.EXE Token: SeShutdownPrivilege 3544 Explorer.EXE Token: SeCreatePagefilePrivilege 3544 Explorer.EXE Token: SeDebugPrivilege 1040 cscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3544 Explorer.EXE 3544 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3544 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3544 wrote to memory of 1040 3544 Explorer.EXE 85 PID 3544 wrote to memory of 1040 3544 Explorer.EXE 85 PID 3544 wrote to memory of 1040 3544 Explorer.EXE 85 PID 1040 wrote to memory of 2764 1040 cscript.exe 88 PID 1040 wrote to memory of 2764 1040 cscript.exe 88 PID 1040 wrote to memory of 2764 1040 cscript.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-