Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
Document.exe
Resource
win7-20240903-en
General
-
Target
Document.exe
-
Size
1.0MB
-
MD5
8128f92e759ef0399a73d001b78bf37e
-
SHA1
64d435e7ca1c98ea6e1b5818d6cc8d0dad22db7d
-
SHA256
2d1d21fefaccdde89b759234f18ed79ea0a8a631c15be4f93fe3106f7fe6abe6
-
SHA512
5de12e936fc0be70ed771cb911e3cacec64a1ddd6e84124bd59b9a56117fd5eae655c79442cc33f971fe686ec8826484c196f04c5c6b85fb6864ac7b24faee30
-
SSDEEP
24576:ffmMv6Ckr7Mny5QL2OTYtNaqimUy7RRtst35de:f3v+7/5QL2mTARReR5de
Malware Config
Extracted
formbook
4.1
n04s
imberstimedtinter.cfd
ttfr44solutionschesapeake.pro
kkas.xyz
sk-frby.xyz
ptowing.net
jzimq-community.xyz
ressoncrookencruller.cfd
amedana.click
ravamarketing.tech
udfa-speech.xyz
ose-bdbzsg.xyz
alsiuuarsiau.xyz
fgiopa.xyz
15501.pro
tart-ewlon.xyz
kjjf-company.xyz
araldschauer.shop
wet25.vip
armostfavorgaivn.cfd
ompa77.click
oldier-nkosi.xyz
ouchs.xyz
eovk-how.xyz
pirutznekg.top
oeda-ssa.xyz
airobi77.cfd
oldplay.click
tzai-space.xyz
ateslotular.xyz
okavuxentid.xyz
53924.pink
trrttfjftw.top
ofdkd-determine.xyz
tudy-hwcd.xyz
apavalley.directory
gnbft-top.xyz
rislyhallyhanced.cfd
ostcanadantyg.top
nowmass.top
ccspt.net
j4yt2.vip
2bmarketingwebinarshub.today
endkos.family
espond-yvctq.xyz
odnotaba.website
3526592.xyz
ist-sxyu.xyz
eat-tyfp.xyz
ndividual-liqkc.xyz
om-trackeg.top
fogatoshadufsshimkus.cfd
etinfin8y.click
reeremovebg.top
5388205.top
nterest-phvfi.xyz
rodutos-corporais.today
cteruvyyn.xyz
ember-kwmapz.xyz
xggc-others.xyz
fyigh-on.xyz
c578.top
adtv-wfj.xyz
afin10.shop
ecbsb.team
280.vip
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4712-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4712-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1488-12-0x00000000010C0000-0x00000000010EF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3716 set thread context of 4712 3716 Document.exe 87 PID 4712 set thread context of 3488 4712 svchost.exe 56 PID 1488 set thread context of 3488 1488 mstsc.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4712 svchost.exe 4712 svchost.exe 4712 svchost.exe 4712 svchost.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe 1488 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3716 Document.exe 4712 svchost.exe 4712 svchost.exe 4712 svchost.exe 1488 mstsc.exe 1488 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4712 svchost.exe Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeDebugPrivilege 1488 mstsc.exe Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE Token: SeShutdownPrivilege 3488 Explorer.EXE Token: SeCreatePagefilePrivilege 3488 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3716 Document.exe 3716 Document.exe 3488 Explorer.EXE 3488 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3716 Document.exe 3716 Document.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3488 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4712 3716 Document.exe 87 PID 3716 wrote to memory of 4712 3716 Document.exe 87 PID 3716 wrote to memory of 4712 3716 Document.exe 87 PID 3716 wrote to memory of 4712 3716 Document.exe 87 PID 3488 wrote to memory of 1488 3488 Explorer.EXE 88 PID 3488 wrote to memory of 1488 3488 Explorer.EXE 88 PID 3488 wrote to memory of 1488 3488 Explorer.EXE 88 PID 1488 wrote to memory of 2572 1488 mstsc.exe 94 PID 1488 wrote to memory of 2572 1488 mstsc.exe 94 PID 1488 wrote to memory of 2572 1488 mstsc.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\Document.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Document.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-