Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
KvG1NAXkgp9PxQb.exe
Resource
win7-20240903-en
General
-
Target
KvG1NAXkgp9PxQb.exe
-
Size
694KB
-
MD5
cf4274ca7587295567c667da6e1bd0e0
-
SHA1
1e6f09bbb822019d3311f317688756d48d0d931a
-
SHA256
3c49acaa8cecf8350267f1be98a72b3c3cc0ab537c0ddb99b20cb6d7e65b916b
-
SHA512
c201dfabb87ef9252fe1124dc46bf3a6a0da685c87047e53a2d103c9f40c1992c245c168758c6286727150cc71ec20536945279a5d3360cf5ce8ced27ba324f5
-
SSDEEP
12288:diIR4R52J+XtONxhwH7L8US0zA50ziWjBoAOIFSDhmAfUq/Wy9jwW7i5IjlMIR:diIeeDNwH7o+cW9oAbtAMq+y9GI
Malware Config
Extracted
formbook
4.1
ax19
nmarklun.biz
eadithere.net
oytromcm.net
6gu536d.shop
hysicsjunction.online
esistivitysensors.net
ealthcare-software-53940.bond
tupid-edsee.cyou
614.lat
agmart.store
lothesthesale.store
ranopen.info
c1v.lat
owflyingbugs.online
undumimmobilien.net
nline-advertising-57252.bond
orktyper.net
kten10.shop
sadeaguia.net
ouseofnormal.party
hypozhe.lol
ilerate.online
nline-advertising-99160.bond
nline-advertising-15828.bond
ourvisa.xyz
hronup.shop
dwing.xyz
njectionweightloss69.xyz
eography-lessons.pro
ealthcare-software-32022.bond
pps-57369.bond
itchen-design-44079.bond
aahoma-nane4.rest
pai-events.online
andlequeencandles.online
oftware-engineering-51273.bond
abio-lentini.live
hillinginghana.net
66by596d.shop
tockninja.sbs
etmail.shop
eurony.fun
nlybeans.net
carlettmone.berlin
ktualisieren.net
ramexot.live
olthubelectronics.store
rostitutkirostova61.net
rijggo.shop
raphic-design-degree-23646.bond
asabella.fun
ristav.fun
15gh827.skin
nline-advertising-77499.bond
ershian.chat
asc-nc.net
quiboost.sbs
om-instead.cyou
aoshang.sbs
olidayheaven.net
edditiptv.net
dnstudio95.store
atelso.xyz
yslagfhlp.online
eecshop.xyz
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4796-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4796-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/708-22-0x0000000000D90000-0x0000000000DBF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
KvG1NAXkgp9PxQb.exeKvG1NAXkgp9PxQb.exeraserver.exedescription pid Process procid_target PID 1624 set thread context of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 4796 set thread context of 3444 4796 KvG1NAXkgp9PxQb.exe 56 PID 708 set thread context of 3444 708 raserver.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
KvG1NAXkgp9PxQb.exeraserver.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KvG1NAXkgp9PxQb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
KvG1NAXkgp9PxQb.exeraserver.exepid Process 4796 KvG1NAXkgp9PxQb.exe 4796 KvG1NAXkgp9PxQb.exe 4796 KvG1NAXkgp9PxQb.exe 4796 KvG1NAXkgp9PxQb.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe 708 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
KvG1NAXkgp9PxQb.exeraserver.exepid Process 4796 KvG1NAXkgp9PxQb.exe 4796 KvG1NAXkgp9PxQb.exe 4796 KvG1NAXkgp9PxQb.exe 708 raserver.exe 708 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
KvG1NAXkgp9PxQb.exeraserver.exedescription pid Process Token: SeDebugPrivilege 4796 KvG1NAXkgp9PxQb.exe Token: SeDebugPrivilege 708 raserver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
KvG1NAXkgp9PxQb.exeExplorer.EXEraserver.exedescription pid Process procid_target PID 1624 wrote to memory of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 1624 wrote to memory of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 1624 wrote to memory of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 1624 wrote to memory of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 1624 wrote to memory of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 1624 wrote to memory of 4796 1624 KvG1NAXkgp9PxQb.exe 98 PID 3444 wrote to memory of 708 3444 Explorer.EXE 99 PID 3444 wrote to memory of 708 3444 Explorer.EXE 99 PID 3444 wrote to memory of 708 3444 Explorer.EXE 99 PID 708 wrote to memory of 3500 708 raserver.exe 101 PID 708 wrote to memory of 3500 708 raserver.exe 101 PID 708 wrote to memory of 3500 708 raserver.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\KvG1NAXkgp9PxQb.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3500
-
-