Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe
Resource
win7-20240903-en
General
-
Target
d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe
-
Size
1.1MB
-
MD5
4683e61354548cd31101748ba961519f
-
SHA1
cdbaf6f43df1dfdc3a01e22e3b23637a52489be4
-
SHA256
d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2
-
SHA512
056de8a362a1450b8053ad7af3b59572ef4b527b60485e50b37826a5712d17f80b5ab8c93c4eb0af9bd34bc6d8302367380098e96611107f93ba0729bde96f78
-
SSDEEP
12288:rLkcoxg7v3qnC11ErwIhh0F4qwUgUny5QLoRrvtAqY5APCxb5wvixoE5t+Krayye:ffmMv6Ckr7Mny5QLoxIWPQ5V2WtJnZJ
Malware Config
Extracted
formbook
4.1
f29s
rostnixon.net
exxxwordz.xyz
ndradesanches.shop
eneral-vceef.xyz
isanbowl.top
aresrasherregard.cfd
dzas-yeah.xyz
0083.miami
hongziyin01.top
jdhfmq.live
alembottling.net
vtyo-phone.xyz
kaqb-decade.xyz
odel-lsmfz.xyz
aradise.tech
uan123-rtp43.xyz
pusptracking.xyz
uqhi42.xyz
mihy-professor.xyz
mnz-your.xyz
iscussion-tjard.xyz
peak-ajau.xyz
ixedcontainerlogistics.today
ranxxletzz.xyz
ccloudserve.xyz
haloryner.website
ro-arenamega.pro
tjcb-wait.xyz
lywjv-issue.xyz
rta-away.xyz
ay888.website
asderkadinkollari.net
specially-smou.xyz
ound-qlhmm.xyz
nit-dreeu.xyz
ea-obgocc.xyz
rostavive-org.xyz
zpp-at.xyz
duxrib.xyz
uohz.net
etsgroove.app
awqs-wonder.xyz
acaxtecameralcarers.cfd
idstream.xyz
umayunileusesingests.shop
avada-cash-out.tech
byataltatweer.net
omething-nvho.xyz
yntomist.pics
aomei517.top
how-ydhtlu.xyz
ise-bjnh.xyz
ovt-jobs-lisitings00810.today
mmgiare.xyz
plqz-move.xyz
onheronummaryorkney.cfd
oqo-over.xyz
aee.pro
as-nhynby.xyz
dnaqm-walk.xyz
aranvickersvirilia.cfd
wqvn-environment.xyz
attern-equd.xyz
ivinetranquilityjourney.pics
kimosskrupulslacker.cfd
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/444-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/444-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/444-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4700-17-0x0000000000B90000-0x0000000000BBF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4848 set thread context of 444 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 87 PID 444 set thread context of 3360 444 svchost.exe 55 PID 444 set thread context of 3360 444 svchost.exe 55 PID 4700 set thread context of 3360 4700 svchost.exe 55 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 444 svchost.exe 444 svchost.exe 444 svchost.exe 444 svchost.exe 444 svchost.exe 444 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe 4700 svchost.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 444 svchost.exe 444 svchost.exe 444 svchost.exe 444 svchost.exe 4700 svchost.exe 4700 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 444 svchost.exe Token: SeDebugPrivilege 4700 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 3360 Explorer.EXE 3360 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3360 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4848 wrote to memory of 444 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 87 PID 4848 wrote to memory of 444 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 87 PID 4848 wrote to memory of 444 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 87 PID 4848 wrote to memory of 444 4848 d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe 87 PID 3360 wrote to memory of 4700 3360 Explorer.EXE 95 PID 3360 wrote to memory of 4700 3360 Explorer.EXE 95 PID 3360 wrote to memory of 4700 3360 Explorer.EXE 95 PID 4700 wrote to memory of 3800 4700 svchost.exe 100 PID 4700 wrote to memory of 3800 4700 svchost.exe 100 PID 4700 wrote to memory of 3800 4700 svchost.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe"C:\Users\Admin\AppData\Local\Temp\d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\d6254ba7494dc16f4b33c879f44fda381215ce53c01319e45f97a2b661e11cc2.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3800
-
-