Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
37fc27ae593c57c90608af9929d7ade4fc5924ec4e795c445c4bf8a5a1bf8585.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37fc27ae593c57c90608af9929d7ade4fc5924ec4e795c445c4bf8a5a1bf8585.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xxrkypy.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
xxrkypy.exe
Resource
win10v2004-20241007-en
General
-
Target
xxrkypy.exe
-
Size
5KB
-
MD5
818e4839cf473064fde652fb001fcce6
-
SHA1
b051185eddc6992bd0b4092e338ed067487af57a
-
SHA256
72eefcdcbb8c9510a83e9ce80810d84688416ede5d4041aee4944f04b7cb903b
-
SHA512
9b8aa6a9ef6d125f80ef555429d45e970f873440d95ac8f687a2ff782d46fdf71c8b66d351010346b989fbeb74f815e96b774a6c463aa9e974399e9a67e50c06
-
SSDEEP
96:bhrJTnFlgFjwaepQr6SRmoynhKMTnHOjx:BJ4Fsaez6moyncMTnH
Malware Config
Extracted
formbook
f4ca
omFHB5ajfJi1UEIEV9XcoRw=
UBjJkmQPyprdhcFF/bdCWQ==
evGKkBUj1je+otcfpw==
KgvGVeOATSt3nug0BIOm2JvOQycB
Lv6o3K0r9aSjI0lr9fg1txw=
LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=
99dte0XauJfk6Xv+uQxJFgA1gMktBA==
21FkkGB9gMniDQw2ffu6
r4lKBM/q6TZwVZfS
F+14qHeVWi56KdQ=
BgWXRsVoICMvvQ==
I+EozFl0Uy56KdQ=
xoXCgEllKEbWfjFCCLo=
qo9G1lXvvGt5GkxrLQWw
ORNlYic0PJ2ip4geEFSv
Yj+GFpvFxy0uVYx1fLI/XQ==
XL+veIKPjOTe4fjvFs+n
D2JKVAfuakXCAyoEvw==
voWJU81tH56wvt/vImbCcgVd
dVEcwFrmb8bZ4vXvFs+n
CMlcaOUF6cB+8Bnm2Kc=
NpYV3moXNE+ZQ4f9nVGCSA==
/GRkjGd1acLHyeLvImbCcgVd
R52MlF+Ag+LtFr1QKa7Zf/5a
kVD/mSO1YK75pA==
5q3IANfo/JHiDww2ffu6
4i8RFOH2ACRdhzja
VLWOSRe00XX6sNsijPzqiiWfFgf1J+g=
qnsgRFL46lWG
xo1QHOyKS9rj4fjvFs+n
mIHZlAqzS6ymmpMCU1uyZgE=
WCtjiGCFl/4JTiJ0R60=
c0vpAtZ3fY7TeLfdcnASQg==
Y87Xlic9/1+q3g/pUArVoB4=
kKOsRsf05wBOd67a
dDmgYgOZZ0aCMVwgDha4bgc=
ieXCbvcCyja+otcfpw==
Fd0XQwkTHHaBmNDvImbCcgVd
PK/M6eM8xOwqvw==
Pf0q8MdfICMvvQ==
EO8aPQwf7z2Du+XvImbCcgVd
BeUisSg/Ql6uJcg=
ay2v2pz4gomTESLosQ==
AGjX3ak2B+FyQ9ZKrQ==
Du0y0UXomyoxT4/arA8Du3FvpwE=
xhV7OrDTdonq4fjvFs+n
9+s2xTlaW66p2IAAnVkDQA==
AuS2UeN4Nsvl5vo8J67Zf/5a
B1vK2590RiUuuw==
/709BIUfMCIln8sus2u2aAM=
BMpYckjp699wVZfS
Pf2AqIscEhlpHlnV18IvVQk=
RKUTxUbz/zFroN/LLq+kIdZM
IuuiQ9pj7ZzciLVPiks4Rxc=
0KBn8XAV7NNm2xPxuA==
nv7yBtDj4UNE/ju8er1EZSanBXfyLv4=
sBgf41X1vKTwUspTsg==
5bk4+oQWD+X01tBEqQ==
c08KjxWnau8DDSsESMKNI+P5G/6/sYjU6g==
RJiyeEVj/N3rhNAW3qU=
v6O7hhQxA//+Oyq2ms9DWQ==
7MdHCYCb4OT5pg==
Je0NLgIfKIeFuyjxYD+i
68P+tIkhBdlwVZfS
inthecryptolane.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation xxrkypy.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1688 set thread context of 2044 1688 xxrkypy.exe 30 PID 2044 set thread context of 1212 2044 xxrkypy.exe 21 PID 2156 set thread context of 1212 2156 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrkypy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2044 xxrkypy.exe 2044 xxrkypy.exe 2044 xxrkypy.exe 2044 xxrkypy.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe 2156 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1688 xxrkypy.exe 2044 xxrkypy.exe 2044 xxrkypy.exe 2044 xxrkypy.exe 2156 help.exe 2156 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 xxrkypy.exe Token: SeDebugPrivilege 2156 help.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2044 1688 xxrkypy.exe 30 PID 1688 wrote to memory of 2044 1688 xxrkypy.exe 30 PID 1688 wrote to memory of 2044 1688 xxrkypy.exe 30 PID 1688 wrote to memory of 2044 1688 xxrkypy.exe 30 PID 1688 wrote to memory of 2044 1688 xxrkypy.exe 30 PID 1212 wrote to memory of 2156 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2156 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2156 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2156 1212 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\xxrkypy.exe"C:\Users\Admin\AppData\Local\Temp\xxrkypy.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\xxrkypy.exe"C:\Users\Admin\AppData\Local\Temp\xxrkypy.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2156
-