Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
Ot7EdLwo881ajbV.exe
Resource
win7-20240903-en
General
-
Target
Ot7EdLwo881ajbV.exe
-
Size
617KB
-
MD5
f99cdd71043a75d4fe553fb39de6d3e5
-
SHA1
28d123dd5f049724ec34cea59a73fb7385b3f904
-
SHA256
356dd4d1abe930b8189e5d5a1870c6a70236a12db73b24c19d0e461056c15dfa
-
SHA512
08cd7223a4019ed691c67e3c93fa7852842235108baaeb21e2ffb14426b0cfd35086ffb7542f675d863a937601f1f8cd1a11ca1f3ef908dd879e445dcee94956
-
SSDEEP
12288:jfAcXkhMOoltiJ5i/6Ob/Bc1WsML0oORqYQb7Z4TwmlKfKPH1fG0Q4bXtk+yE:pkh5oDiJ5i/6ObZcpMnnYQvZo8fKdf/T
Malware Config
Extracted
formbook
4.1
dr14
ypewriter.pro
conoficina.shop
etrules.net
bwuc-ball.xyz
obis.xyz
tpbuncistoto.xyz
lhakikas.net
long-ybzxgm.xyz
ray-east.xyz
hild-rbfij.xyz
imself-kyac.xyz
ftuu-government.xyz
om-tracksi.top
olicy-yzipy.xyz
ntalaxlesbabbool.cfd
ingleyou.top
ieryfiertzframing.cfd
pon-nacgrz.xyz
aomei515.top
alzgroup.net
7032.vip
evel100slot.pro
ideplace.click
jxjxj.lat
ransplant-la1am-hair.today
pkge-last.xyz
rniesphotos.net
uildbin.net
lobalwealth.institute
inairo.pro
oneydewsolutions.net
8630.photo
udience-mgiq.xyz
xpressdiamondscar.shop
umberlestari.net
itringmorbiermugient.cfd
yegle.net
aaqn-safe.xyz
resident-clvedb.xyz
ltj-democratic.xyz
a-tickets45.top
adgeter.xyz
ig02sp5gbps11-mnqrsd.xyz
dtqu.shop
qctdb-race.xyz
test-octopus.click
pioux.xyz
idde.shop
ronereagerereaver.cfd
lo4zj.top
hikiss.net
reast-augmentation12.live
uxj-include.xyz
onnectdesert.click
vailable-qopsca.xyz
ery-ghlbqs.xyz
88886.net
useinidismyerbas.cfd
iadomus.net
ymoviz2012.pro
kin-tozde.xyz
pon-nmlkk.xyz
ywquo.top
onoyekorerolaothoe.cfd
ractice-eiddyy.xyz
Signatures
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1260-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1260-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3740-22-0x0000000000C70000-0x0000000000C9F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4816 set thread context of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 1260 set thread context of 3352 1260 Ot7EdLwo881ajbV.exe 55 PID 3740 set thread context of 3352 3740 cmmon32.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ot7EdLwo881ajbV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1260 Ot7EdLwo881ajbV.exe 1260 Ot7EdLwo881ajbV.exe 1260 Ot7EdLwo881ajbV.exe 1260 Ot7EdLwo881ajbV.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe 3740 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1260 Ot7EdLwo881ajbV.exe 1260 Ot7EdLwo881ajbV.exe 1260 Ot7EdLwo881ajbV.exe 3740 cmmon32.exe 3740 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1260 Ot7EdLwo881ajbV.exe Token: SeDebugPrivilege 3740 cmmon32.exe Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE Token: SeShutdownPrivilege 3352 Explorer.EXE Token: SeCreatePagefilePrivilege 3352 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3352 Explorer.EXE 3352 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3352 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 4816 wrote to memory of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 4816 wrote to memory of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 4816 wrote to memory of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 4816 wrote to memory of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 4816 wrote to memory of 1260 4816 Ot7EdLwo881ajbV.exe 94 PID 3352 wrote to memory of 3740 3352 Explorer.EXE 95 PID 3352 wrote to memory of 3740 3352 Explorer.EXE 95 PID 3352 wrote to memory of 3740 3352 Explorer.EXE 95 PID 3740 wrote to memory of 3176 3740 cmmon32.exe 96 PID 3740 wrote to memory of 3176 3740 cmmon32.exe 96 PID 3740 wrote to memory of 3176 3740 cmmon32.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Ot7EdLwo881ajbV.exe"C:\Users\Admin\AppData\Local\Temp\Ot7EdLwo881ajbV.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Ot7EdLwo881ajbV.exe"C:\Users\Admin\AppData\Local\Temp\Ot7EdLwo881ajbV.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ot7EdLwo881ajbV.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3176
-
-