Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe
Resource
win7-20241010-en
General
-
Target
5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe
-
Size
1.1MB
-
MD5
3a2dac5ed50f9bdc48174ccadc1c9c14
-
SHA1
6c2fd41b108989a39a78f19d74777b38bbe597b5
-
SHA256
5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153
-
SHA512
0bc298a252d7354edee351073afbee4de6819a3aacf0e21d579d1c0c46a142cb4598f3b41edb1134ce6fd21acba6eec74ccced3e568c282573ebd93910067e2e
-
SSDEEP
12288:XG2iNBd/xvwMDpEN8PgUruKQl3UINjwB7BbuUzvNePgrNW2:W1Z/Bp86gtKQl/s7gevNePgr7
Malware Config
Extracted
formbook
fwmz
EVMoY7Gw+zpNcMLX
eXADD4RePMOo+0RvOxjO/Q==
HUAzaMufWaVUl6RcbC0gPiu7EQ==
2M3iedmKTSWi8D5pOxjO/Q==
heFzVamRKfl1dwTLbA==
fxyeUGblrhj0MlLfOxjO/Q==
6jEARb17RJQKRJHIYB3LD/+9
3htk8zHUxezkKDA=
Sj1Hu/6kYE4HhsMxSAA=
Zq8IzvjIWeB4+w==
eYiQ3SG7qOzkKDA=
PZMa7lsB2+zkKDA=
aXEH9k8N1q1jdwTLbA==
7BdtDGwYBNOP0i4Bkj7+CPXsCUv6
DPnyLItdG2EPaIItUfICLLc4zvkWHA==
FyEvlOiOVMK3GHUpuVYJaUYbG3M=
MjnCgM52NPlJkaBLbxzLD/+9
1cXQN5JaL3gcY6Z5j1AYg0YbG3M=
39ReTLB4YOVaoSfqmhc=
oP/Fwf+hYLx8ftOlwlU6Iy6zAIHTFA==
pzHvNbRmPxnaJDLlbCfLD/+9
2970dbZaEuhoobZev7WY5A==
ETQHEXoZ+AT0UJ1yQgTw
qv2XrAKijXdEv/13l080+qk=
uvPEDn0pHBRNcMLX
n6kwEnEf5LFEm5AyPtqsHA0hNE38
ndugxSnzzIdAjc+TOvLbaUYbG3M=
Bv2MggO0oKMUW6zL53UcgkYbG3M=
AfkCdstoJoFwjyDddQ==
x+Miieblbcg=
KmwnH3kUpcd+7A==
I3Q3K2b83GYSbsMxSAA=
XqVtcrNTJuZ0dwTLbA==
ZcTHA1Mk4ioagcMxSAA=
Xa8+JVUD4G4vdsMxSAA=
OY+W4CflkPoYIXpJahzLD/+9
4e9yObJcRk6f8Ai5zsF6G6E=
3D/b71kf1OzkKDA=
xgnUCVkLAnkVXZZyQgTw
3ENd0h3PxuzkKDA=
apFYVrNdS0X19zjIYDD4
YnsE4UwK+/Gg3+5yQgTw
Hm2HCnIu+0T6au29Tw3y
7UFc82Bh6tKH7g==
5P1XGo8+Cf7ALnaq1MF6G6E=
FUKHJ4M9HiwcIDjpSEU4XM1H+vzkBQ==
THVEng3Xtb9BmJY8FhXSPcPV1O6w7Fo=
79XlgeB5XMJ0ubpLaxzLD/+9
hrmJqfqGO5scc3Eht1gMDfPxEoBLtgQrvw==
Smm5Wbx5QgqM5DIRcglrFqA=
zhjrIm8kH4f4PpJQZ/aeVUYbG3M=
KXUwGXUVpcd+7A==
Fytt5DvzxiP3NX6jzsF6G6E=
6kODLos15406cXovTwg=
CSHwA20dGgN4dwTLbA==
795SHWkM/O6B/gqqwMF6G6E=
8hDNqRrOxOzkKDA=
9S9xD2QAs4UznN8PE66X/8T/0u6w7Fo=
jePfF3MVBwPLHC7QOxjO/Q==
5j2IGIch/nY6ZxeQOxjO/Q==
DgELjQG6ti3jTJRUciPLD/+9
qamyDEfss6AQW5642m8cgkYbG3M=
8QlV+SOzglXID2IfsGxPPiu7EQ==
dnsVEk3qxaufCh3feVjMn5QZiwTy
huntingarchive.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3168 set thread context of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 1032 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 1032 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3168 wrote to memory of 736 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 99 PID 3168 wrote to memory of 736 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 99 PID 3168 wrote to memory of 736 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 99 PID 3168 wrote to memory of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100 PID 3168 wrote to memory of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100 PID 3168 wrote to memory of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100 PID 3168 wrote to memory of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100 PID 3168 wrote to memory of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100 PID 3168 wrote to memory of 1032 3168 5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe"C:\Users\Admin\AppData\Local\Temp\5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe"C:\Users\Admin\AppData\Local\Temp\5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe"2⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe"C:\Users\Admin\AppData\Local\Temp\5e15c8defcd19717e92050ad1918f6e33382c6b600d0f19662036a2ece9f1153.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-