Analysis
-
max time kernel
148s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe
Resource
win7-20240903-en
General
-
Target
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe
-
Size
447KB
-
MD5
601b2d6daefd3d2eca786e4d261a753c
-
SHA1
3833e13c1f023af9cc7755b9e696a66c75bf03bb
-
SHA256
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45
-
SHA512
4b4f93670380e9bbdc2d1d962db5fbc41531c2bff474a4a44b09ae665ba000b39a3ae6a0c6a4acda05c5d9f2f508342ad2293ba6c65de1178c77c231e7b1121a
-
SSDEEP
12288:qX3f3jN2fyF88TTI5qa4fcujtyxE8fuDw2qcSo3:afxni8Y5GfbUxKw2co
Malware Config
Extracted
formbook
qzxe
+ofy/jc//gxWTSyDsHNe/HH9Fw==
JJPj3RBaNUVMfGjFDYHn4VdZS07u9w==
MDmWp98UG5ik7K4=
Lyqf4GqrrNshqB8Rd2k=
GSZF9fyueK9D
go++PQqY5pik7K4=
TUKqEY7b6Pw157uI
Dm2xsOPllslVpt49Vg1pbw==
PTqi5lNcK5ik7K4=
7MgiQoDCx90vLLPOxru2
Sy+TnscLsgODvA==
d95Jmv8+SFddJyKWA4T92cc=
MJHl2jFE+ySkGFO3CIT92cc=
21nQ5Csz6DBxEMSd
MPVPVojhzO5ErK1evXY=
XUSG1EWdjJ0YiY0nmpLf2M8=
wzmZpONyKVr2QKY=
Jm3IFI7RxANTgTim+w==
XUJnuClAAUnCpSMXW1SaExea
ambAG315NEd5RsOeJaudSsZCQBMrrtr/Lg==
GxR6x0GEeY4Xg7dee6mv
UC2ExkyfoO0t/hCB5h88C2cqqGf39Q==
cnrH3ghEP1toeSyb8Q==
+lXACnh5FjxxEMSd
41Om33B1LlMlOima8w==
374xeesgHWChhPfnYF2ytnilCX4j
qXLHCHqBOECI6i93wDUs59eVPa+SJ3Wj
ThuDlNbVSpzOqQ==
c27AHY/670hDGWHGEN+4
56v9BCFkaq0D/mxmvnGNSsNOqGf39Q==
edxEjgMe3QycGMz8LWqIVbaS
A3ndM5meZ8IGlds+Vg1pbw==
Xr4MEUVMCRVjwGlFmtMLymv8Hw==
59oqdAJDRne9QbKK
vyttwC47+zB6T8z8LWqIVbaS
abv1PLX56RRPIA9urxx5a9HhHYMp
ac8XEVWmpMHOqCUHQkmaExea
VlGk9HuNO0SHrptKV9r53M8=
5r8EXuQoL0bMRoj1SIcS41TAiB0=
S6oEUMbOk8P8z84ddj2EjV/RXepMWaGm
szGh2VGGgbguIM1zs28=
Qh9zlLk/6wVP5Ngynh8S0H6MZRU=
sw1RlQ8pzu8ALObSD4T92cc=
w1ot29pcYJipArc=
KgM/UIjjy+s0j8ZFhXXTxH6MZRU=
oJvgMZ3h5Onx0L4toB55b+iq7QZq7RU=
YVWqrfbxoNtorJ5KV9r53M8=
ngtbVp/jW32LYESy7SdUFRzhHYMp
LfBEhu75X77Y5K2lAoT92cc=
2WF9BELd2w0=
VUmgpdMcF0G5B763C4T92cc=
0DWY4FhpFVfZL3rYN5/IaiPhFQ==
XtU0eOnyq7gTerZee6mv
Sa2FDY/VzvI6jTxee6mv
b0ye9WSomZEGOajKzcS2
X9I4gBEUxutu0M1zs28=
oP9nZ5vu4yJneSyb8Q==
b8okJmZlIE1keSyb8Q==
qYbVKpOWPFNhOG7Ww4T92cc=
EgFgYKWqL7lCnkVee6mv
rghRYJPz6/H61lhLnZWG6iKhBQ==
k2vJyvFENUNxEMSd
k3DK3edZrEiT/LM=
GgtpvCU07j3DEFO8F5L7ymv8Hw==
ykd-services.net
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2180 set thread context of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2740 set thread context of 1204 2740 CasPol.exe 21 PID 2360 set thread context of 1204 2360 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2740 CasPol.exe 2740 CasPol.exe 2740 CasPol.exe 2740 CasPol.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe 2360 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2740 CasPol.exe 2740 CasPol.exe 2740 CasPol.exe 2360 wscript.exe 2360 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2740 CasPol.exe Token: SeDebugPrivilege 2360 wscript.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 2180 wrote to memory of 2740 2180 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 30 PID 1204 wrote to memory of 2360 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2360 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2360 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2360 1204 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe"C:\Users\Admin\AppData\Local\Temp\ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2360
-