Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe
Resource
win7-20241023-en
General
-
Target
d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe
-
Size
1.1MB
-
MD5
4683e61354548cd31101748ba961519f
-
SHA1
cdbaf6f43df1dfdc3a01e22e3b23637a52489be4
-
SHA256
d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2
-
SHA512
056de8a362a1450b8053ad7af3b59572ef4b527b60485e50b37826a5712d17f80b5ab8c93c4eb0af9bd34bc6d8302367380098e96611107f93ba0729bde96f78
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLoRrvtAqY5APCxb5wvixoE5t+Krayye:ffmMv6Ckr7Mny5QLoxIWPQ5V2WtJnZJ
Malware Config
Extracted
formbook
4.1
f29s
rostnixon.net
exxxwordz.xyz
ndradesanches.shop
eneral-vceef.xyz
isanbowl.top
aresrasherregard.cfd
dzas-yeah.xyz
0083.miami
hongziyin01.top
jdhfmq.live
alembottling.net
vtyo-phone.xyz
kaqb-decade.xyz
odel-lsmfz.xyz
aradise.tech
uan123-rtp43.xyz
pusptracking.xyz
uqhi42.xyz
mihy-professor.xyz
mnz-your.xyz
iscussion-tjard.xyz
peak-ajau.xyz
ixedcontainerlogistics.today
ranxxletzz.xyz
ccloudserve.xyz
haloryner.website
ro-arenamega.pro
tjcb-wait.xyz
lywjv-issue.xyz
rta-away.xyz
ay888.website
asderkadinkollari.net
specially-smou.xyz
ound-qlhmm.xyz
nit-dreeu.xyz
ea-obgocc.xyz
rostavive-org.xyz
zpp-at.xyz
duxrib.xyz
uohz.net
etsgroove.app
awqs-wonder.xyz
acaxtecameralcarers.cfd
idstream.xyz
umayunileusesingests.shop
avada-cash-out.tech
byataltatweer.net
omething-nvho.xyz
yntomist.pics
aomei517.top
how-ydhtlu.xyz
ise-bjnh.xyz
ovt-jobs-lisitings00810.today
mmgiare.xyz
plqz-move.xyz
onheronummaryorkney.cfd
oqo-over.xyz
aee.pro
as-nhynby.xyz
dnaqm-walk.xyz
aranvickersvirilia.cfd
wqvn-environment.xyz
attern-equd.xyz
ivinetranquilityjourney.pics
kimosskrupulslacker.cfd
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2764-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2764-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2764-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2440-18-0x0000000000090000-0x00000000000BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2592 set thread context of 2764 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 30 PID 2764 set thread context of 1208 2764 svchost.exe 21 PID 2764 set thread context of 1208 2764 svchost.exe 21 PID 2440 set thread context of 1208 2440 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 2592 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe 2440 cmstp.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2764 svchost.exe 2440 cmstp.exe 2440 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2764 svchost.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeDebugPrivilege 2440 cmstp.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 1208 Explorer.EXE 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2764 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 30 PID 2592 wrote to memory of 2764 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 30 PID 2592 wrote to memory of 2764 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 30 PID 2592 wrote to memory of 2764 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 30 PID 2592 wrote to memory of 2764 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 30 PID 2592 wrote to memory of 2380 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 31 PID 2592 wrote to memory of 2380 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 31 PID 2592 wrote to memory of 2380 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 31 PID 2592 wrote to memory of 2380 2592 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 31 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2440 1208 Explorer.EXE 32 PID 2440 wrote to memory of 2828 2440 cmstp.exe 33 PID 2440 wrote to memory of 2828 2440 cmstp.exe 33 PID 2440 wrote to memory of 2828 2440 cmstp.exe 33 PID 2440 wrote to memory of 2828 2440 cmstp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe"C:\Users\Admin\AppData\Local\Temp\d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 3963⤵
- Program crash
PID:2380
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-