Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
Quote NoRYU15674.exe
Resource
win7-20240903-en
General
-
Target
Quote NoRYU15674.exe
-
Size
534KB
-
MD5
4f75b9d6f4765318096199de4cc501a6
-
SHA1
ca57a26c665ec2b566fbd0c103cf44f6e0102810
-
SHA256
3295195cc0beb345e8af43273cbedbfcc631c4498f7a91bb1dfa82bfd1cda67b
-
SHA512
7596620eba746ebf0784970c80cf5c3ef563acb70dd0dd8a5762c0690e27eb84e311216924d82de8d28c47d3faec67a2507cb75a217364715fb25d37b7c6eecc
-
SSDEEP
12288:GAsiJr6HjcETqvMrrSYuQY413gIaENyztD00sxxi0/js:DFlgXTgMKI9Q0NaC0
Malware Config
Extracted
formbook
4.1
b26m
zmdjsbe.com
fredandbettysdogtreats.com
naaacyjl.xyz
chestermclean.net
hbxemu.com
daniandlaila.com
liantongquan.com
clubdjportugal.online
ambcu.com
clinkssamui4.xyz
oebfcdtwwkdpspq.com
swnlmu.com
asctechagent.com
melhorearotina.online
infohouseti.com
busstoppanicbutton.com
cheyennewindenergy.com
partlee.com
855408.com
beyourownbossbyob.com
psoriaticarthritisoffers.com
infinityartistry.net
metainstagram.film
toyaaita.xyz
amthuchomnay.net
lonestarribhousebunbury.com
tcachallenge.com
txlvfeng.com
patriotscornerproducts.com
t4p1221.com
deluxnshopping.com
lindblick.xyz
cfnfrto.xyz
k9win.online
danielrabbit.com
fulfilmenteasy.com
danzatandava.online
randallinspection.com
pchubenterprises.com
thehangerr.com
nahlajr.com
thdns-flex.site
jkeltgr.xyz
commongodapparel.com
wavyseal.com
bdcadvocates.com
furniturizm.com
744286.com
ahmetgunes.net
wutyakf.xyz
totallybread.com
debug-dev.com
best-help-debtrelief.website
213150.com
gcbbtn.xyz
careersatmeta.com
bchatbox.net
southwestsafariadventures.com
piaudit.com
qilipingtai.com
bniescuadron.com
vaance-platform.com
lujoespana.xyz
kenal.online
kuthethao.win
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/728-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/728-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4664-22-0x0000000000CD0000-0x0000000000CFF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 628 set thread context of 728 628 Quote NoRYU15674.exe 103 PID 728 set thread context of 3520 728 Quote NoRYU15674.exe 56 PID 4664 set thread context of 3520 4664 raserver.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quote NoRYU15674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 628 Quote NoRYU15674.exe 628 Quote NoRYU15674.exe 628 Quote NoRYU15674.exe 628 Quote NoRYU15674.exe 628 Quote NoRYU15674.exe 628 Quote NoRYU15674.exe 728 Quote NoRYU15674.exe 728 Quote NoRYU15674.exe 728 Quote NoRYU15674.exe 728 Quote NoRYU15674.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe 4664 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 728 Quote NoRYU15674.exe 728 Quote NoRYU15674.exe 728 Quote NoRYU15674.exe 4664 raserver.exe 4664 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 628 Quote NoRYU15674.exe Token: SeDebugPrivilege 728 Quote NoRYU15674.exe Token: SeDebugPrivilege 4664 raserver.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 628 wrote to memory of 2764 628 Quote NoRYU15674.exe 100 PID 628 wrote to memory of 2764 628 Quote NoRYU15674.exe 100 PID 628 wrote to memory of 2764 628 Quote NoRYU15674.exe 100 PID 628 wrote to memory of 4028 628 Quote NoRYU15674.exe 101 PID 628 wrote to memory of 4028 628 Quote NoRYU15674.exe 101 PID 628 wrote to memory of 4028 628 Quote NoRYU15674.exe 101 PID 628 wrote to memory of 3608 628 Quote NoRYU15674.exe 102 PID 628 wrote to memory of 3608 628 Quote NoRYU15674.exe 102 PID 628 wrote to memory of 3608 628 Quote NoRYU15674.exe 102 PID 628 wrote to memory of 728 628 Quote NoRYU15674.exe 103 PID 628 wrote to memory of 728 628 Quote NoRYU15674.exe 103 PID 628 wrote to memory of 728 628 Quote NoRYU15674.exe 103 PID 628 wrote to memory of 728 628 Quote NoRYU15674.exe 103 PID 628 wrote to memory of 728 628 Quote NoRYU15674.exe 103 PID 628 wrote to memory of 728 628 Quote NoRYU15674.exe 103 PID 3520 wrote to memory of 4664 3520 Explorer.EXE 104 PID 3520 wrote to memory of 4664 3520 Explorer.EXE 104 PID 3520 wrote to memory of 4664 3520 Explorer.EXE 104 PID 4664 wrote to memory of 4832 4664 raserver.exe 105 PID 4664 wrote to memory of 4832 4664 raserver.exe 105 PID 4664 wrote to memory of 4832 4664 raserver.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quote NoRYU15674.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-