Analysis
-
max time kernel
146s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
167f095c678aad5d26949f46d21bd2bc07744b09968d780e310484b42404580e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
167f095c678aad5d26949f46d21bd2bc07744b09968d780e310484b42404580e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hgwblnwgct.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
hgwblnwgct.exe
Resource
win10v2004-20241007-en
General
-
Target
hgwblnwgct.exe
-
Size
74KB
-
MD5
4111e78e1b2f65a6c9cde6a549d337d9
-
SHA1
f3ab87fc6678f1f6f676fa3243dedb0728832dbc
-
SHA256
d45f7a637f385cac3c1b519a702d02fbf8d0bbfb883f87454ba352a4fec32bf4
-
SHA512
9c7cdefd0b3712210a1bd31df9306fe1cb371b242dd2c45d3f7365d7e202a046733e8b2645f41f7dd30149f6a12b1687442778fc0abe72c94b6f1958bf1719ec
-
SSDEEP
1536:dntSyjW68naQx9cSiWrX4ezsfNZPGMNftEdt8vklJssWXcdZpkBa:X8nDx9PJzsfNZPGMNfORlhZpkBa
Malware Config
Extracted
formbook
tsuz
7xznvXjpgziXgKV2gqDW
v7D1tLx/XXVj4TTJXNA=
Kksd/nV8o/fgptkq+1ql6A==
vJOH8u8W1nXX
iJ+tj7iKjquTOKxx/3r8KiNc63xxRA==
5xTbq0yL85f2O8soEE0aWGxrjA==
b4/knWkfwQCByw==
AnrOservDq83Fw92/GiG7pk9VAzP
o7ULEGiFpFC6VQ15RtI=
pcuYY7Ei2ReJqmM=
kNvNtWa/SQJpV3t4NFw83Ea4URzU
eGmxllMUuHzf
xwWU/I4R3RuT0A==
h4kM4poKqlXK9NCgTs8=
HkWLW5J3hL6vF2MFgsnAa5N5kpHF
u+nKjgM7r0ewzdd2gqDW
XE4s8ioNHndqM2P+krcGi9g=
OoVuNLkVoUGpwd56GXTPATwOJycptRJwdg==
n5cbiNrqOcpcqGw=
1dve5llFRkJ333E=
VIhkIJnSMrIRPEjarkhuARP5UFQ=
4gtsKskJdQ8Pw9d2gqDW
doN3bPYtiMcFVul4SGQizkTzEspICoyg
GDl+WkSi1P0=
jdTCig06g/dacntkNFGOtDjJ63R8Tg==
9uPJv0p1vjWeuLOOYveYpoiL05kttRJwdg==
uOU8RLSu41tMBOb7sD/e
yxdiTgQW1nXX
Tmm3iHYEt5kVZ+nGpet8ms8=
5wL/74DKLcLwMD8eng==
R0ebpvLd7TXMxfHijw==
9SGJfWrffUzasGU=
m97SjQUW1nXX
WFU3KJ6s+o4BD0VXK4NqkHx4
+WG+WtSmgoYH3ea5U8o4QyVd63xxRA==
p/f72WCqM+9QaS8Okg==
DFFnMGFJbs3CKctCTTrhZ8U=
fZjpyKMHrHmu8u3H
zQHso+fX0fDhjf53vfgDito=
m6WYVYpfTHxt3YMFvk14Hkc5WR2R0WA=
da+JXwtPuGTUMeUICI6XSNE=
Cit6QDvSGTs13nDFmQ==
kJMS65TRMrCdQoBt8EIaWGxrjA==
BCES9iwTPpqBl2O4VdI=
0gtRG3KTzEGnydd2gqDW
0e3Wl+glliIQu9uEhBOxtYt/
ycg17Jb3Z9G5graeeKnGx6fbJy0ttRJwdg==
lLMNxIMQyLsyPQbpgQ==
KnfuzsZE8tVKqC8AgORljYud7XKyx/Dxfg==
//nvxfKwWrqoNu0QyBsMids=
DmXXv7ZO3RuT0A==
UVNSK1EJ6Oi/9fTljw==
y9vZuOG971+C4vDN
da4Oy8Wcre/8oCl2h4jw/w==
7zMxHZWTrvHXptmEhBOxtYt/
IbGmEq4k3RuT0A==
Cf0Nz9KViMGtGbsYkrcGi9g=
Y1/YhvIwwpQD4dN2gqDW
IDQS5EVToyDMxfHijw==
fYVqHtHJ71q4ztZ2gqDW
LV803T8ry01KBye1TaSH/hP5UFQ=
g87PrjNu0Eqr2w331CseyUXCJiVa8I2o
cs+jaMvaHkJ/6ns=
a7HwvpAyBvIquGw=
neapmali.rest
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Control Panel\International\Geo\Nation hgwblnwgct.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2496 set thread context of 2604 2496 hgwblnwgct.exe 29 PID 2604 set thread context of 1264 2604 hgwblnwgct.exe 20 PID 2608 set thread context of 1264 2608 cmstp.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgwblnwgct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2604 hgwblnwgct.exe 2604 hgwblnwgct.exe 2604 hgwblnwgct.exe 2604 hgwblnwgct.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe 2608 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2604 hgwblnwgct.exe 2604 hgwblnwgct.exe 2604 hgwblnwgct.exe 2608 cmstp.exe 2608 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2604 hgwblnwgct.exe Token: SeDebugPrivilege 2608 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2604 2496 hgwblnwgct.exe 29 PID 2496 wrote to memory of 2604 2496 hgwblnwgct.exe 29 PID 2496 wrote to memory of 2604 2496 hgwblnwgct.exe 29 PID 2496 wrote to memory of 2604 2496 hgwblnwgct.exe 29 PID 2496 wrote to memory of 2604 2496 hgwblnwgct.exe 29 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30 PID 1264 wrote to memory of 2608 1264 Explorer.EXE 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\hgwblnwgct.exe"C:\Users\Admin\AppData\Local\Temp\hgwblnwgct.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\hgwblnwgct.exe"C:\Users\Admin\AppData\Local\Temp\hgwblnwgct.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2608
-