Analysis
-
max time kernel
97s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:25
Static task
static1
Behavioral task
behavioral1
Sample
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe
Resource
win10v2004-20241007-en
General
-
Target
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe
-
Size
450KB
-
MD5
cd005dbadf071616082e110600abc48d
-
SHA1
c111f671078a2fc46ec46c501e96079cf97e10c7
-
SHA256
ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f
-
SHA512
d1960751778de17ee541669a51c0c7ea7a007af39fb5a957cb28f08d02819b08ce417c24e1f8b83e401ab2dd5cbd524b2ba1e1b83cf1d1f75291aff52b8af87c
-
SSDEEP
12288:ifH22qla5w/yXbx+DbZ83FLDqqC5l/40PVc:ifH0MW/Ibx+DbZ83pqp5l/
Malware Config
Extracted
formbook
4.1
fs44
whneat.com
jljcw.net
pocodelivery.com
outofplacezine.com
yavuzcansigorta.com
xinhewood-cn.com
cartogogh.com
5avis.com
joyceyong.art
digitalsurf.community
blackcreekbarns.com
magazinedistribuidor.com
sportsgross.com
drevom.online
mayibeofservice.com
gareloi-digit.com
permitha.net
renaissanceestetica.com
facts-r-friends.com
dach-loc.com
thezuki.xyz
cerradoforte.com
yunjin-band.com
soleirasun.com
stoneyinsideout.com
a-sprut.store
verdistar.com
hivingly.com
trywork.net
bvpropertymanagement.com
calibrationprofessionals.com
mpalmcoffee.com
polygons-stakes.site
themomerator.com
payrollserviceform.com
luyensex.club
elon-drop.net
bluechipblog.com
suaempresaemcasa.com
experimentalcircus.art
vietnamesecuisines.com
i4zlyv.com
b23q.xyz
quantumap.com
sana-poratal.site
eastcoastguardfl.com
maxwell-caspar.com
pontochavelocacoes.com
nitsmm.site
tiffanyrockdesign.com
dgmlsubscribers.com
cybericonsultancy.com
bankssy.com
cxitsolution.com
summerinthepark2022.com
chainadmere.com
quangdecalshop.com
winagency.net
motorworks.tech
huefa.club
mthoodviewlodge.com
bahisaltv79.com
codeforge.pro
dpd-gasplumbingandheating.com
echoesdesing.com
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral2/memory/3900-8-0x0000000007370000-0x00000000073E0000-memory.dmp family_purecrypter -
Formbook family
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1004-24-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe -
Executes dropped EXE 1 IoCs
pid Process 4068 Dtyjdrkcyvvjlatasks.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skipyfd = "\"C:\\Users\\Admin\\AppData\\Roaming\\Rbdwvaogv\\Skipyfd.exe\"" ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3900 set thread context of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dtyjdrkcyvvjlatasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4756 timeout.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 1004 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 1004 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4068 Dtyjdrkcyvvjlatasks.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3900 wrote to memory of 3828 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 94 PID 3900 wrote to memory of 3828 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 94 PID 3900 wrote to memory of 3828 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 94 PID 3828 wrote to memory of 4756 3828 cmd.exe 96 PID 3828 wrote to memory of 4756 3828 cmd.exe 96 PID 3828 wrote to memory of 4756 3828 cmd.exe 96 PID 3900 wrote to memory of 4068 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 99 PID 3900 wrote to memory of 4068 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 99 PID 3900 wrote to memory of 4068 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 99 PID 3900 wrote to memory of 4832 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 100 PID 3900 wrote to memory of 4832 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 100 PID 3900 wrote to memory of 4832 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 100 PID 3900 wrote to memory of 4924 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 101 PID 3900 wrote to memory of 4924 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 101 PID 3900 wrote to memory of 4924 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 101 PID 3900 wrote to memory of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102 PID 3900 wrote to memory of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102 PID 3900 wrote to memory of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102 PID 3900 wrote to memory of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102 PID 3900 wrote to memory of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102 PID 3900 wrote to memory of 1004 3900 ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe"C:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 102⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Dtyjdrkcyvvjlatasks.exe"C:\Users\Admin\AppData\Local\Temp\Dtyjdrkcyvvjlatasks.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exeC:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe2⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exeC:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe2⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exeC:\Users\Admin\AppData\Local\Temp\ce85ee918e48a7c9a731c87109b9dbda0db744fe753412dad9397f670beebb8f.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e2c915e5f775cd76f53cab4eede03ba6
SHA12ec952debae802353c29098ca010244d8ff974b5
SHA25619b271898408a5180f1d0d79fc9b316375edb63f509ae8eda49b73cdf8f83f74
SHA512cfee769e8e029a1891a6d45ab92a681604dd6e0818794f03765122d4070c8b6edfa4ce5358fd7258629a6843f4d3b2a236fb04d8fea9f45769245ebbcf38d785