Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe
Resource
win7-20240903-en
General
-
Target
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe
-
Size
1.0MB
-
MD5
a705beae89687fe840600d21503ccabe
-
SHA1
1b3395647588b26f15a180701be18c4c4fcd444c
-
SHA256
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9
-
SHA512
26d9be72899732a252b85683efe58036e4629dfb01c9e73a65a9b89deb75ccb26d4ce124fbb4a30d2ff0df790678d0c1182e33e33c0a56117e386292a1fed247
-
SSDEEP
24576:DRmJkcoQricOIQxiZY1iaKrNoupU7RjFmFqrNJ:wJZoQrbTFZY1iaKm9QcpJ
Malware Config
Extracted
formbook
4.1
cs64
dc02.top
ogelsumopisang.space
hecrazycowrestaurant.online
roneclipse.shop
ijtjs.top
ius.top
stekhare.app
vway.online
ats.social
lavlyxe.info
raphic-design-degree-35680.bond
avrd.shop
egastudyacademy.net
3home.store
afe-naver0m.pro
ortartechnologies.site
23tictactoe.com
card.monster
etafzco.net
outpetit.shop
asquehogar.net
ingkong39king.shop
aggard.xyz
eddingrapher.pro
4001.pictures
uesadilla.one
hbot.pro
hoplix.online
enericsildenafilusa.net
atta-king-15.site
film.shop
estercondom1.shop
ealthcare-trends-81520.bond
uktijpkioswd.info
otorcycle-loans-38228.bond
ofme.net
ucuresti.one
rp.wiki
iuy.shop
neunivers.online
87ik241pi.makeup
pntc72105.vip
elinlikfabrikasi.xyz
kuyangkasa.xyz
sialive88bet94.store
dripoxz.xyz
aduteflix.site
7297.one
rain-pipe-cleaning-43698.bond
xqeobsiuch.makeup
ealthcare-trends-65410.bond
om-trackgue.top
ynamicprices.energy
gumc.net
arimo.world
dlez.boutique
usiness-printer-30253.bond
110zatafoi.pro
eyondyoung.xyz
portybet.cab
afengqiche.online
utorsrq.space
afko.link
ackers.media
icou.online
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1776-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1776-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1776-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/640-16-0x0000000000320000-0x000000000034F000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
Processes:
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exesvchost.exemstsc.exedescription pid Process procid_target PID 3672 set thread context of 1776 3672 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe 86 PID 1776 set thread context of 3520 1776 svchost.exe 56 PID 1776 set thread context of 3520 1776 svchost.exe 56 PID 640 set thread context of 3520 640 mstsc.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exemstsc.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
Processes:
Explorer.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
svchost.exemstsc.exepid Process 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe 640 mstsc.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exesvchost.exemstsc.exepid Process 3672 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 640 mstsc.exe 640 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
svchost.exeExplorer.EXEmstsc.exedescription pid Process Token: SeDebugPrivilege 1776 svchost.exe Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE Token: SeDebugPrivilege 640 mstsc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid Process 3520 Explorer.EXE 3520 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exeExplorer.EXEmstsc.exedescription pid Process procid_target PID 3672 wrote to memory of 1776 3672 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe 86 PID 3672 wrote to memory of 1776 3672 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe 86 PID 3672 wrote to memory of 1776 3672 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe 86 PID 3672 wrote to memory of 1776 3672 1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe 86 PID 3520 wrote to memory of 640 3520 Explorer.EXE 96 PID 3520 wrote to memory of 640 3520 Explorer.EXE 96 PID 3520 wrote to memory of 640 3520 Explorer.EXE 96 PID 640 wrote to memory of 2172 640 mstsc.exe 101 PID 640 wrote to memory of 2172 640 mstsc.exe 101 PID 640 wrote to memory of 2172 640 mstsc.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe"C:\Users\Admin\AppData\Local\Temp\1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\1a635d43f1ea2b5506eaf73b1783847d16f51646054cd8bb92bcf82eb3b4aae9.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-