Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe
Resource
win7-20240903-en
General
-
Target
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe
-
Size
447KB
-
MD5
601b2d6daefd3d2eca786e4d261a753c
-
SHA1
3833e13c1f023af9cc7755b9e696a66c75bf03bb
-
SHA256
ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45
-
SHA512
4b4f93670380e9bbdc2d1d962db5fbc41531c2bff474a4a44b09ae665ba000b39a3ae6a0c6a4acda05c5d9f2f508342ad2293ba6c65de1178c77c231e7b1121a
-
SSDEEP
12288:qX3f3jN2fyF88TTI5qa4fcujtyxE8fuDw2qcSo3:afxni8Y5GfbUxKw2co
Malware Config
Extracted
formbook
qzxe
+ofy/jc//gxWTSyDsHNe/HH9Fw==
JJPj3RBaNUVMfGjFDYHn4VdZS07u9w==
MDmWp98UG5ik7K4=
Lyqf4GqrrNshqB8Rd2k=
GSZF9fyueK9D
go++PQqY5pik7K4=
TUKqEY7b6Pw157uI
Dm2xsOPllslVpt49Vg1pbw==
PTqi5lNcK5ik7K4=
7MgiQoDCx90vLLPOxru2
Sy+TnscLsgODvA==
d95Jmv8+SFddJyKWA4T92cc=
MJHl2jFE+ySkGFO3CIT92cc=
21nQ5Csz6DBxEMSd
MPVPVojhzO5ErK1evXY=
XUSG1EWdjJ0YiY0nmpLf2M8=
wzmZpONyKVr2QKY=
Jm3IFI7RxANTgTim+w==
XUJnuClAAUnCpSMXW1SaExea
ambAG315NEd5RsOeJaudSsZCQBMrrtr/Lg==
GxR6x0GEeY4Xg7dee6mv
UC2ExkyfoO0t/hCB5h88C2cqqGf39Q==
cnrH3ghEP1toeSyb8Q==
+lXACnh5FjxxEMSd
41Om33B1LlMlOima8w==
374xeesgHWChhPfnYF2ytnilCX4j
qXLHCHqBOECI6i93wDUs59eVPa+SJ3Wj
ThuDlNbVSpzOqQ==
c27AHY/670hDGWHGEN+4
56v9BCFkaq0D/mxmvnGNSsNOqGf39Q==
edxEjgMe3QycGMz8LWqIVbaS
A3ndM5meZ8IGlds+Vg1pbw==
Xr4MEUVMCRVjwGlFmtMLymv8Hw==
59oqdAJDRne9QbKK
vyttwC47+zB6T8z8LWqIVbaS
abv1PLX56RRPIA9urxx5a9HhHYMp
ac8XEVWmpMHOqCUHQkmaExea
VlGk9HuNO0SHrptKV9r53M8=
5r8EXuQoL0bMRoj1SIcS41TAiB0=
S6oEUMbOk8P8z84ddj2EjV/RXepMWaGm
szGh2VGGgbguIM1zs28=
Qh9zlLk/6wVP5Ngynh8S0H6MZRU=
sw1RlQ8pzu8ALObSD4T92cc=
w1ot29pcYJipArc=
KgM/UIjjy+s0j8ZFhXXTxH6MZRU=
oJvgMZ3h5Onx0L4toB55b+iq7QZq7RU=
YVWqrfbxoNtorJ5KV9r53M8=
ngtbVp/jW32LYESy7SdUFRzhHYMp
LfBEhu75X77Y5K2lAoT92cc=
2WF9BELd2w0=
VUmgpdMcF0G5B763C4T92cc=
0DWY4FhpFVfZL3rYN5/IaiPhFQ==
XtU0eOnyq7gTerZee6mv
Sa2FDY/VzvI6jTxee6mv
b0ye9WSomZEGOajKzcS2
X9I4gBEUxutu0M1zs28=
oP9nZ5vu4yJneSyb8Q==
b8okJmZlIE1keSyb8Q==
qYbVKpOWPFNhOG7Ww4T92cc=
EgFgYKWqL7lCnkVee6mv
rghRYJPz6/H61lhLnZWG6iKhBQ==
k2vJyvFENUNxEMSd
k3DK3edZrEiT/LM=
GgtpvCU07j3DEFO8F5L7ymv8Hw==
ykd-services.net
Signatures
-
Formbook family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4804 set thread context of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 2584 set thread context of 3432 2584 CasPol.exe 56 PID 2584 set thread context of 3432 2584 CasPol.exe 56 PID 3896 set thread context of 3432 3896 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wscript.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 2584 CasPol.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe 3896 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2584 CasPol.exe Token: SeDebugPrivilege 3896 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 4804 wrote to memory of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 4804 wrote to memory of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 4804 wrote to memory of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 4804 wrote to memory of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 4804 wrote to memory of 2584 4804 ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe 83 PID 3432 wrote to memory of 3896 3432 Explorer.EXE 85 PID 3432 wrote to memory of 3896 3432 Explorer.EXE 85 PID 3432 wrote to memory of 3896 3432 Explorer.EXE 85 PID 3896 wrote to memory of 1016 3896 wscript.exe 101 PID 3896 wrote to memory of 1016 3896 wscript.exe 101 PID 3896 wrote to memory of 1016 3896 wscript.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe"C:\Users\Admin\AppData\Local\Temp\ccc792e234a29204157d4833f4ca76b93328cdb9cb6f4830d1bd283934d49e45.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1016
-
-