Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
KvG1NAXkgp9PxQb.exe
Resource
win7-20240903-en
General
-
Target
KvG1NAXkgp9PxQb.exe
-
Size
694KB
-
MD5
cf4274ca7587295567c667da6e1bd0e0
-
SHA1
1e6f09bbb822019d3311f317688756d48d0d931a
-
SHA256
3c49acaa8cecf8350267f1be98a72b3c3cc0ab537c0ddb99b20cb6d7e65b916b
-
SHA512
c201dfabb87ef9252fe1124dc46bf3a6a0da685c87047e53a2d103c9f40c1992c245c168758c6286727150cc71ec20536945279a5d3360cf5ce8ced27ba324f5
-
SSDEEP
12288:diIR4R52J+XtONxhwH7L8US0zA50ziWjBoAOIFSDhmAfUq/Wy9jwW7i5IjlMIR:diIeeDNwH7o+cW9oAbtAMq+y9GI
Malware Config
Extracted
formbook
4.1
ax19
nmarklun.biz
eadithere.net
oytromcm.net
6gu536d.shop
hysicsjunction.online
esistivitysensors.net
ealthcare-software-53940.bond
tupid-edsee.cyou
614.lat
agmart.store
lothesthesale.store
ranopen.info
c1v.lat
owflyingbugs.online
undumimmobilien.net
nline-advertising-57252.bond
orktyper.net
kten10.shop
sadeaguia.net
ouseofnormal.party
hypozhe.lol
ilerate.online
nline-advertising-99160.bond
nline-advertising-15828.bond
ourvisa.xyz
hronup.shop
dwing.xyz
njectionweightloss69.xyz
eography-lessons.pro
ealthcare-software-32022.bond
pps-57369.bond
itchen-design-44079.bond
aahoma-nane4.rest
pai-events.online
andlequeencandles.online
oftware-engineering-51273.bond
abio-lentini.live
hillinginghana.net
66by596d.shop
tockninja.sbs
etmail.shop
eurony.fun
nlybeans.net
carlettmone.berlin
ktualisieren.net
ramexot.live
olthubelectronics.store
rostitutkirostova61.net
rijggo.shop
raphic-design-degree-23646.bond
asabella.fun
ristav.fun
15gh827.skin
nline-advertising-77499.bond
ershian.chat
asc-nc.net
quiboost.sbs
om-instead.cyou
aoshang.sbs
olidayheaven.net
edditiptv.net
dnstudio95.store
atelso.xyz
yslagfhlp.online
eecshop.xyz
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3060-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/3060-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2676-27-0x00000000000F0000-0x000000000011F000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2696 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
KvG1NAXkgp9PxQb.exeKvG1NAXkgp9PxQb.execmstp.exedescription pid Process procid_target PID 1708 set thread context of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 3060 set thread context of 1188 3060 KvG1NAXkgp9PxQb.exe 21 PID 3060 set thread context of 1188 3060 KvG1NAXkgp9PxQb.exe 21 PID 2676 set thread context of 1188 2676 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
KvG1NAXkgp9PxQb.execmstp.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KvG1NAXkgp9PxQb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
KvG1NAXkgp9PxQb.execmstp.exepid Process 3060 KvG1NAXkgp9PxQb.exe 3060 KvG1NAXkgp9PxQb.exe 3060 KvG1NAXkgp9PxQb.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe 2676 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
KvG1NAXkgp9PxQb.execmstp.exepid Process 3060 KvG1NAXkgp9PxQb.exe 3060 KvG1NAXkgp9PxQb.exe 3060 KvG1NAXkgp9PxQb.exe 3060 KvG1NAXkgp9PxQb.exe 2676 cmstp.exe 2676 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
KvG1NAXkgp9PxQb.execmstp.exedescription pid Process Token: SeDebugPrivilege 3060 KvG1NAXkgp9PxQb.exe Token: SeDebugPrivilege 2676 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
KvG1NAXkgp9PxQb.exeExplorer.EXEcmstp.exedescription pid Process procid_target PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1708 wrote to memory of 3060 1708 KvG1NAXkgp9PxQb.exe 31 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2676 1188 Explorer.EXE 32 PID 2676 wrote to memory of 2696 2676 cmstp.exe 33 PID 2676 wrote to memory of 2696 2676 cmstp.exe 33 PID 2676 wrote to memory of 2696 2676 cmstp.exe 33 PID 2676 wrote to memory of 2696 2676 cmstp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2696
-
-