Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe
Resource
win7-20240903-en
General
-
Target
51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe
-
Size
273KB
-
MD5
e549341d5f45d8ac49bd6e75d4d72d35
-
SHA1
f25f8f48778b995e408bd84f58800ad1c7a7328f
-
SHA256
51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882
-
SHA512
3e37e90128974062766a2de3bf4647853da2d04a407a37ea3b55107a3cb18315e2929aedce12871361447bfd0d4c58c56bba098b0cd4b332c541271cb2410437
-
SSDEEP
6144://UFQEmfXkLoIeTB/CEj4kCK8ASHLeqe6z22p7h9guq/xG:XUiEmfULagEj4kb89njZguq/s
Malware Config
Extracted
formbook
i3tw
016XYOaa546POq6CaRVpEfQ=
6WCLUcRz6K7qTqIK
bIa/9uWTepQa6eQd
32urdxWXgrknUIeDYktb
EojfLVA0GyB2mYgMgzdT
jFbHYJhPwpebnHjAY0pZ
gxSusEwA30uVtrErCrQ=
EeJOmOn63OaCHIw=
r3K0jTvKtOR4EV3q1dOdHgYVCLVG
6LEakplWzoSSLXZH3t6XDQ==
MThmlLavncxvAo1f3t6XDQ==
SqUmLs+BeJfa69kp7qSmIfuU5K3ZMg==
GuIYfF0o7zGPJY4=
AEd4Wd7JRsdzBX9dPgO7KNJY6NX2Sga4
E1SDU8MxGoZaPFgn9w==
cIq96QyWC/k1XDBRTR9FQOaLosd4Og==
/zRZMuaxmZnX291wZQCXhiq1his=
+47IMmwvk2jyx7MA
IGKz6DH4iraNLQ==
Kh1gHpxbw0MDkwSyaOqjKgTlK69R
us77JxjUuzGPJY4=
bC983vu5Hwnh+eoR
pdfCGZchzH+9Hs68nxRbFgDlK69R
kabYE/2zj2ZdPFgn9w==
BhI+iLy0k5Ua6eQd
4V2vpLCkyb4P
rrEyqp4Mg5Ea6eQd
Nkifp0P/Keo6V0XAY0pZ
az5/L7xt0pDaQZJM/w==
d6XhCTP7iraNLQ==
NwNOCK2nJsCCGWr12NCcXhDgGQ==
0pkGiLBz2bwcNxlnOAC/LATlK69R
4qjJEQCekQDIZbYuonWNGg==
5dNGyOCRCPY2SUXAY0pZ
ssRR9ScjBPgqzUtN3t6XDQ==
GrIxF6RjVYMEGR+7evq5ojzSjCE=
maw32ybYViMzNRVxQRs1XhDgGQ==
WGCaofq039IX
/0SJ2fdj5e94WyMyCYtR
5TJ3VOyYj9pid07AY0pZ
cW/ihZsFcIgPmkOJS7w=
9Ey+siSOdAoNpBkvA3bCf1/MiiE=
Z7CgpQK45+cd
lGbek8rHuzGPJY4=
WhFRKdfJO+0PKhsL9m70cWqJF8BtLt4=
3+Bh1+BkxpqluJymfUhlXhDgGQ==
avd0XfqiiOTB08oQ2FhO
5kDA0jzlUuzJXNfq338j07tm5K3ZMg==
eoy5AQ7Hui3/pEOJS7w=
icr0JUe9M2IyFvEf
3fEpdW0rGRtOXUuHdmAYifnIjyk=
ioD7d4w3qWlcPFgn9w==
EyRVl3we8e8vSzyUcRCiH71nlT4=
vspQsfo7iraNLQ==
OQBpBj7RNyNkhm5vWRAs7pw3P5D1v9ie1w==
6/IbWEX41ex/I4gb/oDSm3sKmyE=
o0nAsSICeScgw3sB1FwjBQ==
3BpuXQPBrDGPJY4=
AZXGKFwRdR8rRio33t6XDQ==
sUTT0UGjo11oGZp3QQc1XhDgGQ==
Omyf5wuZ/q7B3csQ2FhO
JjRksfirIvz9nR9xRrY=
3POP/+9y3dMTvRHrzWcHwizNEw==
/RA5X31zbnKiwq6+sVb8hXAVE/LesM8=
voaguria.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1404 set thread context of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 1824 set thread context of 3516 1824 cvtres.exe 56 PID 3128 set thread context of 3516 3128 colorcpl.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe -
description ioc Process Key created \Registry\User\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1824 cvtres.exe 1824 cvtres.exe 1824 cvtres.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe 3128 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1824 cvtres.exe Token: SeDebugPrivilege 3128 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 1404 wrote to memory of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 1404 wrote to memory of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 1404 wrote to memory of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 1404 wrote to memory of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 1404 wrote to memory of 1824 1404 51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe 83 PID 3516 wrote to memory of 3128 3516 Explorer.EXE 84 PID 3516 wrote to memory of 3128 3516 Explorer.EXE 84 PID 3516 wrote to memory of 3128 3516 Explorer.EXE 84 PID 3128 wrote to memory of 1800 3128 colorcpl.exe 97 PID 3128 wrote to memory of 1800 3128 colorcpl.exe 97 PID 3128 wrote to memory of 1800 3128 colorcpl.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe"C:\Users\Admin\AppData\Local\Temp\51411372b243457824f813704098d411028c9041a6510ddf74be80cfa94b1882.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1800
-
-