Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
sifariş n° 5600885643.exe
Resource
win7-20241023-en
General
-
Target
sifariş n° 5600885643.exe
-
Size
520KB
-
MD5
f8af21f5e6bf374da4096d72e177e639
-
SHA1
6c103339eaf0b787352326a6a801d5ae9d6d0000
-
SHA256
4ef2bca501b3ffbee1ba497670fac37c1a2a27247aa48a955228eb0fa2810120
-
SHA512
e90e298204845519f9c272f857669be6f98948a92b28ba6f063b592bb2898cb18dcc228c243d3601f38c07df9b09f49d80b0700eadfdf909f01f3f2e33835fb8
-
SSDEEP
6144:rHd/9YLC4IDSVtYIttqwFIWkjrLPMAFxJca5MClL6Y6N5pOvRu9+x+zTzV7:h/2qyYIttsBx/2S6YrvRY+Ip
Malware Config
Extracted
formbook
4.1
zs84
kubet66x.online
webtergabuak.com
searlont.top
mariammacghey.xyz
iotcs.dev
soulserenity.online
coop-santarita.com
xn--emagreacomprazer-hpb.site
suistake.xyz
oanavasiu.com
cornerstonepartners.us
rexgrocery.store
4walls.store
kinako105.com
ednateixeirabrand.com
6735468723.online
erin-watson.com
merop.online
evidentexchange.com
1wxba.top
primeutility.shop
gisillabet.com
harcourts.store
eliminacionderonquidos.com
excavatorrentalsfranklin.com
exozuvy.bond
dkmachinery.store
constructionsoluitionstx.com
poolcompanyhouston.com
mastermindenterprises.info
reljanta.com
nguoidepvitoc.site
v-s.dev
scrunchaustralia.store
raymarca.com
shopify-postmaster1.info
kathleenlorenzo.com
mjthngtb.com
gracepropertyandevent.com
canyonstatecrafts.com
skia-faff.xyz
aanfang.com
oyshoppesay.pro
heuristics.xyz
elitecustomsut.net
smartsender.dev
advocaats.online
nutricionmentecuerpo.com
93345.top
ky7355.com
diaryofacitygal.com
inspirecdc.online
wazedy.shop
hxkj.site
illusionsvr.com
carjumpstarts.store
sattelitetrans.com
boreddaoprotocol.com
drysunday.xyz
enourrgj.work
hfhxfcawc.xyz
epicgym.net
daydan.click
kelliefit.site
crtextil.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3548-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3548-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4484-14-0x0000000000140000-0x000000000016F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4016 set thread context of 3548 4016 sifariş n° 5600885643.exe 82 PID 3548 set thread context of 3572 3548 CasPol.exe 56 PID 4484 set thread context of 3572 4484 ipconfig.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4484 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3548 CasPol.exe 3548 CasPol.exe 3548 CasPol.exe 3548 CasPol.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe 4484 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3548 CasPol.exe 3548 CasPol.exe 3548 CasPol.exe 4484 ipconfig.exe 4484 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3548 CasPol.exe Token: SeDebugPrivilege 4484 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4016 wrote to memory of 3548 4016 sifariş n° 5600885643.exe 82 PID 4016 wrote to memory of 3548 4016 sifariş n° 5600885643.exe 82 PID 4016 wrote to memory of 3548 4016 sifariş n° 5600885643.exe 82 PID 4016 wrote to memory of 3548 4016 sifariş n° 5600885643.exe 82 PID 4016 wrote to memory of 3548 4016 sifariş n° 5600885643.exe 82 PID 4016 wrote to memory of 3548 4016 sifariş n° 5600885643.exe 82 PID 3572 wrote to memory of 4484 3572 Explorer.EXE 83 PID 3572 wrote to memory of 4484 3572 Explorer.EXE 83 PID 3572 wrote to memory of 4484 3572 Explorer.EXE 83 PID 4484 wrote to memory of 3668 4484 ipconfig.exe 84 PID 4484 wrote to memory of 3668 4484 ipconfig.exe 84 PID 4484 wrote to memory of 3668 4484 ipconfig.exe 84
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\sifariş n° 5600885643.exe"C:\Users\Admin\AppData\Local\Temp\sifariş n° 5600885643.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-