Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
ELAN#0472940573000.exe
Resource
win7-20240903-en
General
-
Target
ELAN#0472940573000.exe
-
Size
40KB
-
MD5
bcc10d614981f0eed446306185ba0a3a
-
SHA1
cc400a605e2febdaa27b5887f55a922372b6e298
-
SHA256
4b7c88deb8cd20b960e2d396f24708a6018d2a1483fda51b7444b0685b3888da
-
SHA512
87f97bbe1a4c73b93a34ac6efa0a6b8722b0a43f17b9e805066539a65eb709289ef26d4bdb9f53e174cb41116a9e0d26014495e3b6e90470d631b68c6f1c7147
-
SSDEEP
768:W33QdsUZYRx8OC0cKRSbA7vJRc8GvPQoA0BAtHzae6M:WHQFY8OC0VSbqvJRc8GvPQoRBAtKM
Malware Config
Extracted
formbook
4.1
tomx
fistlike.website
marks-denki.cloud
6zn3wp.top
warehouse-services-86876.bond
voidcast.lol
bathroom-remodeling-50828.bond
freedentalimplants15.site
virtual-assistant-81181.bond
v48s6d5.shop
bizkairo.com
midwesterne.click
d008otoeq.site
chantroimoi586.click
folsomtakesaction.net
healthcare-software-10982.bond
paths2healing.net
interac-pay24.shop
campaigncrushconsultants.world
uui3960.top
bagiqqa.biz
gsmboy.online
supersports.one
atyuio.online
7771566com08xl09.sbs
tiklaayaginagelsin.online
thebetterbrand.net
4si.shop
airevolutionelite.com
termsqm.top
fietsy.online
qlzhmz.top
rastreamentodeitem.online
automation-tools-98377.bond
garytripoli.net
work-in-usa-37193.bond
plussales.website
suprememodels.live
meal-delivery-30373.bond
bathroom-remodeling-92407.bond
surrogate-mother-gb-006.space
sooori.shop
moneynow2024.today
331288com08xl04.sbs
discovereducators.store
bonustogelz.lol
formapapket.online
gacortoto.net
scaleonline.digital
biona.store
rdnsshds-ininid.bond
jujuvex.top
albieparker.com
isletv.xyz
tvztrlxz.cfd
smartclient.sbs
bitcoinwhitepaper.shop
usedtoyot.bond
arkansasadventurescompany.com
mayivukeparents.xyz
cemalsteelconstruction.tech
thethevolteragroup.online
garden-fence-50368.bond
hiddenmarvels.xyz
999web.xyz
lthaoguo.shop
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/4352-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4352-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1740-23-0x0000000000AB0000-0x0000000000ADF000-memory.dmp formbook -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ELAN#0472940573000 = "C:\\Users\\Admin\\Documents\\ELAN#0472940573000.pif" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4660 set thread context of 4352 4660 ELAN#0472940573000.exe 95 PID 4352 set thread context of 3520 4352 ELAN#0472940573000.exe 56 PID 1740 set thread context of 3520 1740 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ELAN#0472940573000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4660 ELAN#0472940573000.exe 4352 ELAN#0472940573000.exe 4352 ELAN#0472940573000.exe 4352 ELAN#0472940573000.exe 4352 ELAN#0472940573000.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe 1740 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4352 ELAN#0472940573000.exe 4352 ELAN#0472940573000.exe 4352 ELAN#0472940573000.exe 1740 chkdsk.exe 1740 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4660 ELAN#0472940573000.exe Token: SeDebugPrivilege 4352 ELAN#0472940573000.exe Token: SeDebugPrivilege 1740 chkdsk.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4204 4660 ELAN#0472940573000.exe 88 PID 4660 wrote to memory of 4204 4660 ELAN#0472940573000.exe 88 PID 4660 wrote to memory of 4204 4660 ELAN#0472940573000.exe 88 PID 4204 wrote to memory of 2016 4204 cmd.exe 90 PID 4204 wrote to memory of 2016 4204 cmd.exe 90 PID 4204 wrote to memory of 2016 4204 cmd.exe 90 PID 4660 wrote to memory of 2020 4660 ELAN#0472940573000.exe 93 PID 4660 wrote to memory of 2020 4660 ELAN#0472940573000.exe 93 PID 4660 wrote to memory of 2020 4660 ELAN#0472940573000.exe 93 PID 4660 wrote to memory of 4352 4660 ELAN#0472940573000.exe 95 PID 4660 wrote to memory of 4352 4660 ELAN#0472940573000.exe 95 PID 4660 wrote to memory of 4352 4660 ELAN#0472940573000.exe 95 PID 4660 wrote to memory of 4352 4660 ELAN#0472940573000.exe 95 PID 4660 wrote to memory of 4352 4660 ELAN#0472940573000.exe 95 PID 4660 wrote to memory of 4352 4660 ELAN#0472940573000.exe 95 PID 3520 wrote to memory of 1740 3520 Explorer.EXE 97 PID 3520 wrote to memory of 1740 3520 Explorer.EXE 97 PID 3520 wrote to memory of 1740 3520 Explorer.EXE 97 PID 1740 wrote to memory of 4464 1740 chkdsk.exe 98 PID 1740 wrote to memory of 4464 1740 chkdsk.exe 98 PID 1740 wrote to memory of 4464 1740 chkdsk.exe 98
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\ELAN#0472940573000.exe"C:\Users\Admin\AppData\Local\Temp\ELAN#0472940573000.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "ELAN#0472940573000" /t REG_SZ /F /D "C:\Users\Admin\Documents\ELAN#0472940573000.pif"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "ELAN#0472940573000" /t REG_SZ /F /D "C:\Users\Admin\Documents\ELAN#0472940573000.pif"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c Copy "C:\Users\Admin\AppData\Local\Temp\ELAN#0472940573000.exe" "C:\Users\Admin\Documents\ELAN#0472940573000.pif"3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\ELAN#0472940573000.exe"C:\Users\Admin\AppData\Local\Temp\ELAN#0472940573000.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ELAN#0472940573000.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-