Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
VNXCNVCVCXJKGSD.exe
Resource
win7-20240903-en
General
-
Target
VNXCNVCVCXJKGSD.exe
-
Size
289KB
-
MD5
903d0bd798ca8a3387247fb7c17c86d3
-
SHA1
bb423a6d299a6b706c63dcf0d793bfdc34ff4bda
-
SHA256
aa5a2cc65f212e1ca681e2cdc53fa73dabca4b15ad8319cf07cfae6b513dc6ef
-
SHA512
71c260fa5e7267b3f719689f4295a025941401896f01057e692820b46fe682e7ee5861d183aa96e16d67c91d4fc9f79e01af4fcab56ca09ee00a8343b2dec6e6
-
SSDEEP
6144:K5BzJCUXtLVxYv1vUF/LGhOzVGboBQvJwrJj/VpTQj2HZ:0rtrBF/bzV1QBSJj/Uj25
Malware Config
Extracted
formbook
oc5e
ODVenWNCx27xmAQc
4XFONwe0gAX06UZqkA==
AD3Pph7KlPo7lQ==
UR3vF7OcYyyilfE=
dYHbq1q35dWIhecnJZ3aFJEGlDwKDoVM
ZjGUfBForJkYdek=
eHXQr1tI+ySegwM4iBtUkk4KNg0FYMk=
4a8FTkEp+vCjm+4=
aCWI49e/KcsQ8E+EU4GeShabmBah
E6V1p68mgTWfSkhOiA==
iWj9y0Sg3MU2lw==
oHsJ45Ot5v14oRA8Ut6Tqxw=
trdTtZNlNF+VuwQU
tEUYVnll1L4ojA==
Es81jGdN1YW3luwCr3T+WFk0wA==
g5eqC/tlYmtjxxJjnZM4
lFju1HzZ7iWVxxEe
4KE7NhR0YoW9Wllpmw==
qWVEpocCITjplgcphg==
FuCHb/9aumc7
9solfHRs+358btT+ICFPiAc=
tVMvI9pSsj900AspyDLMdBI=
2K0xKwVpUl3N51N/mQ==
h4+eAvNVPE6J90aG7p00iINg2A==
MDtVx804KSsdmQ1VHVl7omC63PA=
oGxIcxsO1AcFY5+lIxrYGMsCW5RM4A==
BNw4jWlRz0C9nfA=
Rxtz4+DGO3Cnj/I=
vYeUbhaGWnOrGXOc/I6w8dHQA2RZ6g==
2aB4v3ttPEVsYpyvEE/CUw==
56vPAfvrZ+3fxRUhVU1mnvA8oAz6LY1R
g02qFCMBbb6yG4SW5ZoKKuaDlEP4SCRE
T4dx2vRagxeH6EHDuzazUQ==
TymyrnpzOnbu5CRdq3DrCYic
nGYJPUKWvWERK32jre4Gm1CK
ITrT1ZSuCL0971aGng==
5/FaSxx52YeLetEABlOFy00HAJCEkIiYlQ==
uq+coqeUamvplgcphg==
JOv48bAqCSmVxxEe
qWXG0XZmMF/XveJa77Qw
oKQQ/80sLTFhit8H
zuHxUEel7GWd9GuEQnh+lmC63PA=
bgNcmKOZEI54cqA4ICFPiAc=
ubtLqo56AYN0dbjgQP22bijjA2RZ6g==
xF83cWLHx/xDnwpAWd6Tqxw=
hxdrR+fYNLvryzWzNDXDRA==
12mD5kSd3MU2lw==
QhaqqXJjHUhOqwQVS74uiINg2A==
wVerfBoN2QgJZcTsQMU3iINg2A==
xsQeXn7h6hA/8hpJkw==
n6s6m0JjPT5sYGq6bm8l
/sXNDCgBlNocAFuQmQ==
Zd0DzEkqIDcx
tDsQ6poE6K2pjew=
iZeg/t5RdZgO51iE12GEiINg2A==
q3vY15TzAwsAauVjnZM4
gUbs4XPeLzk0
l2vzNz0b6/MfDnnRLGOFoRg=
CM7u4bqabWrplgcphg==
mq81dD4nrVuQet0L41pGgQU=
dXeUolDOIdWJvg84iA==
Bs6w8L/mKS0s
Hdu7KDSnnsb6Ysslv6OOMPl/pUC4
7e7ey5Bt46jtA1lplw==
precisionride.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1116 set thread context of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 4484 set thread context of 3592 4484 Regsvcs.exe 56 PID 4336 set thread context of 3592 4336 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VNXCNVCVCXJKGSD.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 4484 Regsvcs.exe 4484 Regsvcs.exe 4484 Regsvcs.exe 4336 help.exe 4336 help.exe 4336 help.exe 4336 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4484 Regsvcs.exe Token: SeDebugPrivilege 4336 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1116 wrote to memory of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 1116 wrote to memory of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 1116 wrote to memory of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 1116 wrote to memory of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 1116 wrote to memory of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 1116 wrote to memory of 4484 1116 VNXCNVCVCXJKGSD.exe 83 PID 3592 wrote to memory of 4336 3592 Explorer.EXE 84 PID 3592 wrote to memory of 4336 3592 Explorer.EXE 84 PID 3592 wrote to memory of 4336 3592 Explorer.EXE 84 PID 4336 wrote to memory of 2092 4336 help.exe 101 PID 4336 wrote to memory of 2092 4336 help.exe 101 PID 4336 wrote to memory of 2092 4336 help.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\VNXCNVCVCXJKGSD.exe"C:\Users\Admin\AppData\Local\Temp\VNXCNVCVCXJKGSD.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2092
-
-