Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe
Resource
win7-20240903-en
General
-
Target
51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe
-
Size
273KB
-
MD5
e549341d5f45d8ac49bd6e75d4d72d35
-
SHA1
f25f8f48778b995e408bd84f58800ad1c7a7328f
-
SHA256
51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882
-
SHA512
3e37e90128974062766a2de3bf4647853da2d04a407a37ea3b55107a3cb18315e2929aedce12871361447bfd0d4c58c56bba098b0cd4b332c541271cb2410437
-
SSDEEP
6144://UFQEmfXkLoIeTB/CEj4kCK8ASHLeqe6z22p7h9guq/xG:XUiEmfULagEj4kb89njZguq/s
Malware Config
Extracted
formbook
i3tw
016XYOaa546POq6CaRVpEfQ=
6WCLUcRz6K7qTqIK
bIa/9uWTepQa6eQd
32urdxWXgrknUIeDYktb
EojfLVA0GyB2mYgMgzdT
jFbHYJhPwpebnHjAY0pZ
gxSusEwA30uVtrErCrQ=
EeJOmOn63OaCHIw=
r3K0jTvKtOR4EV3q1dOdHgYVCLVG
6LEakplWzoSSLXZH3t6XDQ==
MThmlLavncxvAo1f3t6XDQ==
SqUmLs+BeJfa69kp7qSmIfuU5K3ZMg==
GuIYfF0o7zGPJY4=
AEd4Wd7JRsdzBX9dPgO7KNJY6NX2Sga4
E1SDU8MxGoZaPFgn9w==
cIq96QyWC/k1XDBRTR9FQOaLosd4Og==
/zRZMuaxmZnX291wZQCXhiq1his=
+47IMmwvk2jyx7MA
IGKz6DH4iraNLQ==
Kh1gHpxbw0MDkwSyaOqjKgTlK69R
us77JxjUuzGPJY4=
bC983vu5Hwnh+eoR
pdfCGZchzH+9Hs68nxRbFgDlK69R
kabYE/2zj2ZdPFgn9w==
BhI+iLy0k5Ua6eQd
4V2vpLCkyb4P
rrEyqp4Mg5Ea6eQd
Nkifp0P/Keo6V0XAY0pZ
az5/L7xt0pDaQZJM/w==
d6XhCTP7iraNLQ==
NwNOCK2nJsCCGWr12NCcXhDgGQ==
0pkGiLBz2bwcNxlnOAC/LATlK69R
4qjJEQCekQDIZbYuonWNGg==
5dNGyOCRCPY2SUXAY0pZ
ssRR9ScjBPgqzUtN3t6XDQ==
GrIxF6RjVYMEGR+7evq5ojzSjCE=
maw32ybYViMzNRVxQRs1XhDgGQ==
WGCaofq039IX
/0SJ2fdj5e94WyMyCYtR
5TJ3VOyYj9pid07AY0pZ
cW/ihZsFcIgPmkOJS7w=
9Ey+siSOdAoNpBkvA3bCf1/MiiE=
Z7CgpQK45+cd
lGbek8rHuzGPJY4=
WhFRKdfJO+0PKhsL9m70cWqJF8BtLt4=
3+Bh1+BkxpqluJymfUhlXhDgGQ==
avd0XfqiiOTB08oQ2FhO
5kDA0jzlUuzJXNfq338j07tm5K3ZMg==
eoy5AQ7Hui3/pEOJS7w=
icr0JUe9M2IyFvEf
3fEpdW0rGRtOXUuHdmAYifnIjyk=
ioD7d4w3qWlcPFgn9w==
EyRVl3we8e8vSzyUcRCiH71nlT4=
vspQsfo7iraNLQ==
OQBpBj7RNyNkhm5vWRAs7pw3P5D1v9ie1w==
6/IbWEX41ex/I4gb/oDSm3sKmyE=
o0nAsSICeScgw3sB1FwjBQ==
3BpuXQPBrDGPJY4=
AZXGKFwRdR8rRio33t6XDQ==
sUTT0UGjo11oGZp3QQc1XhDgGQ==
Omyf5wuZ/q7B3csQ2FhO
JjRksfirIvz9nR9xRrY=
3POP/+9y3dMTvRHrzWcHwizNEw==
/RA5X31zbnKiwq6+sVb8hXAVE/LesM8=
voaguria.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1804 set thread context of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 2816 set thread context of 1256 2816 cvtres.exe 21 PID 2816 set thread context of 1256 2816 cvtres.exe 21 PID 648 set thread context of 1256 648 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2816 cvtres.exe 2816 cvtres.exe 2816 cvtres.exe 2816 cvtres.exe 2816 cvtres.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe 648 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2816 cvtres.exe 2816 cvtres.exe 2816 cvtres.exe 2816 cvtres.exe 648 help.exe 648 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2816 cvtres.exe Token: SeDebugPrivilege 648 help.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1804 wrote to memory of 2816 1804 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 31 PID 1256 wrote to memory of 648 1256 Explorer.EXE 51 PID 1256 wrote to memory of 648 1256 Explorer.EXE 51 PID 1256 wrote to memory of 648 1256 Explorer.EXE 51 PID 1256 wrote to memory of 648 1256 Explorer.EXE 51
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe"C:\Users\Admin\AppData\Local\Temp\51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2780
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2612
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2828
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2924
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2616
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2028
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2604
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2792
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2624
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2852
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1648
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2576
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2572
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2592
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2608
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2644
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2652
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2700
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1716
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:648
-