Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe
Resource
win7-20240903-en
General
-
Target
0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe
-
Size
1011KB
-
MD5
926683bcefaa5c0f235a2ab849910468
-
SHA1
faad2c56e0daaef20e4fe3b9dc55cc186b05248c
-
SHA256
0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916
-
SHA512
ec484bfac455891323d550c957c658201c2f136c62153c7eb85c9ac0b3366b0f75e25005339ef177da31778f73a1eda2f6d253527b37b8c47eee72f0f435f0e5
-
SSDEEP
24576:bKVAMZ/KKLHceVye1bOTijzw4Go5KGUP:uVAMLf1bQy841KGc
Malware Config
Extracted
formbook
4.1
k8be
wakecountyrealtyexpert.com
marianichola.com
artesaniasyalgomas.com
generationstart.xyz
huaiyou.net
takaokaaki.com
akiactu.info
poulmanfatime.com
mosznowladcy.com
post-consumerism.com
mcdonaldscheeseburger.com
mhkxlgs.com
bigbox.pro
littlekylskap.com
tacos-blog.com
leanbellyofficialstore.online
drakesportsmarketing.com
catholicsinglestv.com
gazoo-bike.com
33sexy.com
abletelephone.systems
pgki87ttp.com
leveluptruckee.com
pricefor.store
phsutah.com
moldespararesina.com
melbournefacials.com
keysthatrock.net
treedecoratingchallenge.com
buyerpalace.com
aktau.group
curebase-test.com
rusticrimboutique.com
thoughtsunderthecrescent.com
ilovecorpus.com
ghettogypsies.com
lq-safe-keepingtoyof4.xyz
7seye.icu
haaelth.com
jetskifishing.online
leoirlandscaping.com
villagegreencoffee.com
bodrumpetgross.com
siamled.com
ff4ci74gs.xyz
c2batlrnd09ustnnaku2721.com
belledescontos.com
heifurther.xyz
buschow-family.com
clapbeatproductions.com
systemfoundation.com
laspalabrasylascosas.com
tuviah.info
iphone13pro.photography
wuliben.com
brangers2.com
change4cancer.store
horsmon-merchanising.com
mymonocular.com
assuredslofpm.xyz
freeparking.tech
mobileticker.info
bandunis.com
kingall.xyz
fpyekklm.quest
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1060-6-0x0000000000400000-0x000000000044F000-memory.dmp formbook behavioral2/memory/1060-9-0x0000000000400000-0x000000000044F000-memory.dmp formbook behavioral2/memory/4188-17-0x0000000000170000-0x000000000019F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4620 set thread context of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 1060 set thread context of 3436 1060 mountvol.exe 56 PID 4188 set thread context of 3436 4188 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mountvol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 1060 mountvol.exe 1060 mountvol.exe 1060 mountvol.exe 1060 mountvol.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe 4188 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1060 mountvol.exe 1060 mountvol.exe 1060 mountvol.exe 4188 cmmon32.exe 4188 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe Token: SeDebugPrivilege 1060 mountvol.exe Token: SeDebugPrivilege 4188 cmmon32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 4620 wrote to memory of 1060 4620 0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe 84 PID 3436 wrote to memory of 4188 3436 Explorer.EXE 85 PID 3436 wrote to memory of 4188 3436 Explorer.EXE 85 PID 3436 wrote to memory of 4188 3436 Explorer.EXE 85 PID 4188 wrote to memory of 1308 4188 cmmon32.exe 86 PID 4188 wrote to memory of 1308 4188 cmmon32.exe 86 PID 4188 wrote to memory of 1308 4188 cmmon32.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe"C:\Users\Admin\AppData\Local\Temp\0ef96ff9377d04bcd3e007944145f1f75a4d35a49c283c705d4439d7551ef916.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\mountvol.exe"C:\Windows\SysWOW64\mountvol.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\mountvol.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1308
-
-