Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 19:46
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20240903-en
General
-
Target
2.exe
-
Size
185KB
-
MD5
cb90c75f8cbbbcc3f74ee22288c800a1
-
SHA1
1c84ad88465e6eb1b91dfaf099bf2697e44ccc0d
-
SHA256
b3d45d85cba27f6900215868e9e6e9a97fb95648a42396305cd8bcb50c8e80d0
-
SHA512
22e8fd5f34e92ffb92e362efdc3866c9bfab68a5f6f463f64ae4f16876722dd4595e0cff34f970dd87140859b58e6acdb20c8b82f27ed42bbf7cc80f46e7a314
-
SSDEEP
3072:8MHDFaMPRIjxWcy4C9y30XclW6Qilinp0fJ4XNZkAC581h/dgHG0uD1X4/qZa:e7UL4Co3js6QilinA4XN+zKh/uG0u5XC
Malware Config
Extracted
formbook
4.1
l26n
vtxapg.bond
iscussatthetable.net
q5b2.vip
urculturalbuzz.buzz
0xfulisuo.xyz
iz-kyc.online
atladies4kamala.vote
aison-maison.xyz
codom73.online
aosecurity.online
szxart.xyz
ergecast.net
ealker.pro
hickensforkfc.net
ldoradocasino-uee.top
afiqgroup.net
ercania.net
sdc.ngo
raphic-design-degree-37012.bond
888yl123.vip
fipertsales.online
o9ht6yn.baby
arutoto.net
oasdpyreasoonjop.cloud
aitowarna4d.info
exhost.online
nboxers.xyz
arlosurquiza.online
400725rfcwhnl588.top
esponserateraisers.xyz
mail-marketing-18153.bond
5jfpn13.xyz
ental-bridges-47950.bond
awn-mower-72655.bond
l-pvc-floor-comments-25j.today
indmix.net
hc-coop.net
uywr.info
eauty-services-us-1812922.live
avid87chdz.dev
ikdown.online
oanweb.today
as-grills-01010.bond
acking-jobs-17244.bond
nlinepmpcourses.today
heikh.website
8463.photo
rsac.fun
20177.pink
tirz8.digital
herapy-centers-70897.bond
hark42.online
ubisite.xyz
sli-susuvegan.asia
laypokerdom.world
hantienquocgia24hs.online
iveniu.top
55525.club
nternallybeautiful.net
milelab.pro
zzurri.team
etworkcenterhome8.dev
agar-taxa-2024.online
iveswing.xyz
atiana-gadalka.online
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/3060-2-0x00000000003D0000-0x00000000003FF000-memory.dmp formbook behavioral1/memory/1980-6-0x00000000000D0000-0x00000000000FF000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2180 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3060 set thread context of 1372 3060 2.exe 20 PID 1980 set thread context of 1372 1980 colorcpl.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3060 2.exe 3060 2.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe 1980 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1372 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3060 2.exe 3060 2.exe 3060 2.exe 1980 colorcpl.exe 1980 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3060 2.exe Token: SeDebugPrivilege 1980 colorcpl.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1980 1372 Explorer.EXE 29 PID 1372 wrote to memory of 1980 1372 Explorer.EXE 29 PID 1372 wrote to memory of 1980 1372 Explorer.EXE 29 PID 1372 wrote to memory of 1980 1372 Explorer.EXE 29 PID 1980 wrote to memory of 2180 1980 colorcpl.exe 30 PID 1980 wrote to memory of 2180 1980 colorcpl.exe 30 PID 1980 wrote to memory of 2180 1980 colorcpl.exe 30 PID 1980 wrote to memory of 2180 1980 colorcpl.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2180
-
-