Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 19:46
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20240903-en
General
-
Target
2.exe
-
Size
185KB
-
MD5
cb90c75f8cbbbcc3f74ee22288c800a1
-
SHA1
1c84ad88465e6eb1b91dfaf099bf2697e44ccc0d
-
SHA256
b3d45d85cba27f6900215868e9e6e9a97fb95648a42396305cd8bcb50c8e80d0
-
SHA512
22e8fd5f34e92ffb92e362efdc3866c9bfab68a5f6f463f64ae4f16876722dd4595e0cff34f970dd87140859b58e6acdb20c8b82f27ed42bbf7cc80f46e7a314
-
SSDEEP
3072:8MHDFaMPRIjxWcy4C9y30XclW6Qilinp0fJ4XNZkAC581h/dgHG0uD1X4/qZa:e7UL4Co3js6QilinA4XN+zKh/uG0u5XC
Malware Config
Extracted
formbook
4.1
l26n
vtxapg.bond
iscussatthetable.net
q5b2.vip
urculturalbuzz.buzz
0xfulisuo.xyz
iz-kyc.online
atladies4kamala.vote
aison-maison.xyz
codom73.online
aosecurity.online
szxart.xyz
ergecast.net
ealker.pro
hickensforkfc.net
ldoradocasino-uee.top
afiqgroup.net
ercania.net
sdc.ngo
raphic-design-degree-37012.bond
888yl123.vip
fipertsales.online
o9ht6yn.baby
arutoto.net
oasdpyreasoonjop.cloud
aitowarna4d.info
exhost.online
nboxers.xyz
arlosurquiza.online
400725rfcwhnl588.top
esponserateraisers.xyz
mail-marketing-18153.bond
5jfpn13.xyz
ental-bridges-47950.bond
awn-mower-72655.bond
l-pvc-floor-comments-25j.today
indmix.net
hc-coop.net
uywr.info
eauty-services-us-1812922.live
avid87chdz.dev
ikdown.online
oanweb.today
as-grills-01010.bond
acking-jobs-17244.bond
nlinepmpcourses.today
heikh.website
8463.photo
rsac.fun
20177.pink
tirz8.digital
herapy-centers-70897.bond
hark42.online
ubisite.xyz
sli-susuvegan.asia
laypokerdom.world
hantienquocgia24hs.online
iveniu.top
55525.club
nternallybeautiful.net
milelab.pro
zzurri.team
etworkcenterhome8.dev
agar-taxa-2024.online
iveswing.xyz
atiana-gadalka.online
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3168-2-0x0000000001000000-0x000000000102F000-memory.dmp formbook behavioral2/memory/3168-5-0x0000000001000000-0x000000000102F000-memory.dmp formbook behavioral2/memory/1572-11-0x00000000004C0000-0x00000000004EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3168 set thread context of 3388 3168 2.exe 56 PID 3168 set thread context of 3388 3168 2.exe 56 PID 1572 set thread context of 3388 1572 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3168 2.exe 3168 2.exe 3168 2.exe 3168 2.exe 3168 2.exe 3168 2.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe 1572 rundll32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3168 2.exe 3168 2.exe 3168 2.exe 3168 2.exe 1572 rundll32.exe 1572 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3168 2.exe Token: SeDebugPrivilege 1572 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3388 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1572 3388 Explorer.EXE 92 PID 3388 wrote to memory of 1572 3388 Explorer.EXE 92 PID 3388 wrote to memory of 1572 3388 Explorer.EXE 92 PID 1572 wrote to memory of 1764 1572 rundll32.exe 94 PID 1572 wrote to memory of 1764 1572 rundll32.exe 94 PID 1572 wrote to memory of 1764 1572 rundll32.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1764
-
-