Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe
Resource
win7-20240903-en
General
-
Target
e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe
-
Size
1.1MB
-
MD5
acf8be68b18fe80b0812385f920b9a67
-
SHA1
77b3d6ef5e56521f9819605617e36acb268cf0cb
-
SHA256
e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617
-
SHA512
71a28e5d74d6cfb94144919f289a71a62b692591e00b01f1713ba6f9ca07e1d97e77690408ce7c266d414b541a51b6836c2a19c4f56bef4661916cddc110598b
-
SSDEEP
24576:0RmJkcoQricOIQxiZY1iaB0NgOMaUDfUb5eJikXO:RJZoQrbTFZY1iaB0NBMam+5d
Malware Config
Extracted
formbook
4.1
nu01
ickleball.codes
avornow.top
rejike.shop
zean.pro
yanbeyan.net
atwithsushi.fun
heimpactphilanthropy.info
ersonal-loans-82514.bond
pringfestpro.xyz
eniorhousings.live
anda-tax.online
d8ul135j.top
nder168.xyz
ealthcare-softwares-my-pl.xyz
7w1q.bond
83167836550.online
etinjo.net
hukira.xyz
ocalip.cloud
cqnh6.digital
503.top
lockchaincommunity.africa
q2vtm.club
6yy.xyz
inling.world
edroomsinmx-in.bond
oing3.cfd
ite.style
v7spf78.christmas
lein-curacao.info
rkyzgnmwd.xyz
ar-loans-86831.bond
outh32hubs.top
agamento-aiiepress.online
utritionistscourse.shop
nvaya.info
ygqntly.shop
heur365swiss.net
uelcard112.shop
eluniverses.xyz
panish-classes-62417.bond
ndsm.top
g6z5ndpx.mobi
ociobuzzyour.top
hiagency.net
ankeverything.net
nline-dating-sf-dz.online
all.school
0f57.bond
arinelayersaleshops.shop
askuda.pro
pttraining.info
riginaltheme.shop
nlinesuccesswithben.biz
jane1620.club
ysnails.net
ompleteconciergeliving.xyz
u-opts.shop
eamkakakads177.buzz
ealthcare-trends-60670.bond
t0rm23.top
gfdro.xyz
oundwav.xyz
ugarshift.net
trategicgrowthpartner.app
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/216-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/216-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/64-12-0x0000000000130000-0x000000000015F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4436 set thread context of 216 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 86 PID 216 set thread context of 3408 216 svchost.exe 55 PID 64 set thread context of 3408 64 mstsc.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 216 svchost.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe 64 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 216 svchost.exe 216 svchost.exe 216 svchost.exe 64 mstsc.exe 64 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 216 svchost.exe Token: SeDebugPrivilege 64 mstsc.exe Token: SeShutdownPrivilege 3408 Explorer.EXE Token: SeCreatePagefilePrivilege 3408 Explorer.EXE Token: SeShutdownPrivilege 3408 Explorer.EXE Token: SeCreatePagefilePrivilege 3408 Explorer.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 3408 Explorer.EXE 3408 Explorer.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3408 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4436 wrote to memory of 216 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 86 PID 4436 wrote to memory of 216 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 86 PID 4436 wrote to memory of 216 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 86 PID 4436 wrote to memory of 216 4436 e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe 86 PID 3408 wrote to memory of 64 3408 Explorer.EXE 87 PID 3408 wrote to memory of 64 3408 Explorer.EXE 87 PID 3408 wrote to memory of 64 3408 Explorer.EXE 87 PID 64 wrote to memory of 3340 64 mstsc.exe 88 PID 64 wrote to memory of 3340 64 mstsc.exe 88 PID 64 wrote to memory of 3340 64 mstsc.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe"C:\Users\Admin\AppData\Local\Temp\e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\e70447c828015246065108b80ee39088ae98a00561a1531ed0da79b9079f6617.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3340
-
-