Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
VNXCNVCVCXJKGSD.exe
Resource
win7-20240903-en
General
-
Target
VNXCNVCVCXJKGSD.exe
-
Size
289KB
-
MD5
903d0bd798ca8a3387247fb7c17c86d3
-
SHA1
bb423a6d299a6b706c63dcf0d793bfdc34ff4bda
-
SHA256
aa5a2cc65f212e1ca681e2cdc53fa73dabca4b15ad8319cf07cfae6b513dc6ef
-
SHA512
71c260fa5e7267b3f719689f4295a025941401896f01057e692820b46fe682e7ee5861d183aa96e16d67c91d4fc9f79e01af4fcab56ca09ee00a8343b2dec6e6
-
SSDEEP
6144:K5BzJCUXtLVxYv1vUF/LGhOzVGboBQvJwrJj/VpTQj2HZ:0rtrBF/bzV1QBSJj/Uj25
Malware Config
Extracted
formbook
oc5e
ODVenWNCx27xmAQc
4XFONwe0gAX06UZqkA==
AD3Pph7KlPo7lQ==
UR3vF7OcYyyilfE=
dYHbq1q35dWIhecnJZ3aFJEGlDwKDoVM
ZjGUfBForJkYdek=
eHXQr1tI+ySegwM4iBtUkk4KNg0FYMk=
4a8FTkEp+vCjm+4=
aCWI49e/KcsQ8E+EU4GeShabmBah
E6V1p68mgTWfSkhOiA==
iWj9y0Sg3MU2lw==
oHsJ45Ot5v14oRA8Ut6Tqxw=
trdTtZNlNF+VuwQU
tEUYVnll1L4ojA==
Es81jGdN1YW3luwCr3T+WFk0wA==
g5eqC/tlYmtjxxJjnZM4
lFju1HzZ7iWVxxEe
4KE7NhR0YoW9Wllpmw==
qWVEpocCITjplgcphg==
FuCHb/9aumc7
9solfHRs+358btT+ICFPiAc=
tVMvI9pSsj900AspyDLMdBI=
2K0xKwVpUl3N51N/mQ==
h4+eAvNVPE6J90aG7p00iINg2A==
MDtVx804KSsdmQ1VHVl7omC63PA=
oGxIcxsO1AcFY5+lIxrYGMsCW5RM4A==
BNw4jWlRz0C9nfA=
Rxtz4+DGO3Cnj/I=
vYeUbhaGWnOrGXOc/I6w8dHQA2RZ6g==
2aB4v3ttPEVsYpyvEE/CUw==
56vPAfvrZ+3fxRUhVU1mnvA8oAz6LY1R
g02qFCMBbb6yG4SW5ZoKKuaDlEP4SCRE
T4dx2vRagxeH6EHDuzazUQ==
TymyrnpzOnbu5CRdq3DrCYic
nGYJPUKWvWERK32jre4Gm1CK
ITrT1ZSuCL0971aGng==
5/FaSxx52YeLetEABlOFy00HAJCEkIiYlQ==
uq+coqeUamvplgcphg==
JOv48bAqCSmVxxEe
qWXG0XZmMF/XveJa77Qw
oKQQ/80sLTFhit8H
zuHxUEel7GWd9GuEQnh+lmC63PA=
bgNcmKOZEI54cqA4ICFPiAc=
ubtLqo56AYN0dbjgQP22bijjA2RZ6g==
xF83cWLHx/xDnwpAWd6Tqxw=
hxdrR+fYNLvryzWzNDXDRA==
12mD5kSd3MU2lw==
QhaqqXJjHUhOqwQVS74uiINg2A==
wVerfBoN2QgJZcTsQMU3iINg2A==
xsQeXn7h6hA/8hpJkw==
n6s6m0JjPT5sYGq6bm8l
/sXNDCgBlNocAFuQmQ==
Zd0DzEkqIDcx
tDsQ6poE6K2pjew=
iZeg/t5RdZgO51iE12GEiINg2A==
q3vY15TzAwsAauVjnZM4
gUbs4XPeLzk0
l2vzNz0b6/MfDnnRLGOFoRg=
CM7u4bqabWrplgcphg==
mq81dD4nrVuQet0L41pGgQU=
dXeUolDOIdWJvg84iA==
Bs6w8L/mKS0s
Hdu7KDSnnsb6Ysslv6OOMPl/pUC4
7e7ey5Bt46jtA1lplw==
precisionride.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2084 set thread context of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 796 set thread context of 1172 796 Regsvcs.exe 21 PID 2664 set thread context of 1172 2664 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VNXCNVCVCXJKGSD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 796 Regsvcs.exe 796 Regsvcs.exe 796 Regsvcs.exe 796 Regsvcs.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe 2664 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 796 Regsvcs.exe 796 Regsvcs.exe 796 Regsvcs.exe 2664 cmmon32.exe 2664 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 796 Regsvcs.exe Token: SeDebugPrivilege 2664 cmmon32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 2084 wrote to memory of 796 2084 VNXCNVCVCXJKGSD.exe 31 PID 1172 wrote to memory of 2664 1172 Explorer.EXE 32 PID 1172 wrote to memory of 2664 1172 Explorer.EXE 32 PID 1172 wrote to memory of 2664 1172 Explorer.EXE 32 PID 1172 wrote to memory of 2664 1172 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\VNXCNVCVCXJKGSD.exe"C:\Users\Admin\AppData\Local\Temp\VNXCNVCVCXJKGSD.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2664
-