Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe
Resource
win7-20240708-en
General
-
Target
59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe
-
Size
1.1MB
-
MD5
96d3854d251ef67abcd64dd77d8e8f96
-
SHA1
67287638bb52465804179d38f522dfe782cfaec9
-
SHA256
59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939
-
SHA512
9ef435c8d176fc5b87c32309ca1d3a6500f7692ef47627898445f4918b78be5b6f5f5eb8ddf0141dce4cb57f381329261c84bf3a3d7df0f250a91810daeb8deb
-
SSDEEP
24576:ffmMv6Ckr7Mny5QLkwtPiDovnB/ZcObUP1:f3v+7/5QLkwcDovn70P1
Malware Config
Extracted
formbook
4.1
ge07
mail-marketing2-9946168.live
ouwmijnweb.net
verythingmars.online
rgqhcy.shop
unter-saaaa.buzz
ox.bio
arkside.top
ransportationmmsktpro.top
lue-ocean-bar.group
lympiccat.xyz
onstruction-jobs-49170.bond
andon-saaab.buzz
fdmw.sbs
48430091.top
yuyh.boats
kyt968.shop
pismedical.shop
ocialmediafactory.xyz
inussofa.shop
ision.fit
himenote.shop
eto-gummies-01010.bond
ummpk.online
bx.mobi
werad-neumann.info
polo77meledak.fun
uel-fleet-cards-60697.bond
asaslotzeed.online
media.group
gfdsq.xyz
stralexploration.website
ltraslot.win
-16.net
hellalee-llc.xyz
cz9mi.digital
mea.tech
ools-59989.bond
y94nt6.vip
ubaimports.online
tlantishealth.online
athing-suits-78317.bond
uxembourgembassypakistan.shop
262jpdhkd.bond
38gk910gy.autos
q345.vip
attlesaber.net
alecell.net
blungit.xyz
anfrontier.net
obic.info
erman3d.shop
igxyuje.click
eartestqa.bond
ar-deals-77763.bond
dormy.click
oodchoicemall.net
otelmanagementdegree.info
ental-health-91275.bond
76jys301.top
asecore.net
oursocialbuzz.buzz
amuel-paaaa.buzz
ercadaoshop.shop
ome-care-37159.bond
ruisjob.today
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/224-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/224-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1236-12-0x0000000000CB0000-0x0000000000CDF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exesvchost.exewlanext.exedescription pid Process procid_target PID 2420 set thread context of 224 2420 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe 87 PID 224 set thread context of 3532 224 svchost.exe 56 PID 1236 set thread context of 3532 1236 wlanext.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exe59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exewlanext.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Modifies registry class 3 IoCs
Processes:
Explorer.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
svchost.exewlanext.exepid Process 224 svchost.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe 1236 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exesvchost.exewlanext.exepid Process 2420 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe 224 svchost.exe 224 svchost.exe 224 svchost.exe 1236 wlanext.exe 1236 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
svchost.exeExplorer.EXEwlanext.exedescription pid Process Token: SeDebugPrivilege 224 svchost.exe Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE Token: SeDebugPrivilege 1236 wlanext.exe Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE Token: SeShutdownPrivilege 3532 Explorer.EXE Token: SeCreatePagefilePrivilege 3532 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid Process 3532 Explorer.EXE 3532 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 3532 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exeExplorer.EXEwlanext.exedescription pid Process procid_target PID 2420 wrote to memory of 224 2420 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe 87 PID 2420 wrote to memory of 224 2420 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe 87 PID 2420 wrote to memory of 224 2420 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe 87 PID 2420 wrote to memory of 224 2420 59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe 87 PID 3532 wrote to memory of 1236 3532 Explorer.EXE 88 PID 3532 wrote to memory of 1236 3532 Explorer.EXE 88 PID 3532 wrote to memory of 1236 3532 Explorer.EXE 88 PID 1236 wrote to memory of 708 1236 wlanext.exe 94 PID 1236 wrote to memory of 708 1236 wlanext.exe 94 PID 1236 wrote to memory of 708 1236 wlanext.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe"C:\Users\Admin\AppData\Local\Temp\59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\59ae2629ce8149b038cd46ad72a9e76de8678f8c0f284ff6182d642c05007939.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:708
-
-