Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 04:57
Static task
static1
Behavioral task
behavioral1
Sample
6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe
Resource
win7-20240903-en
General
-
Target
6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe
-
Size
1.8MB
-
MD5
94c391b1bbc7b6c52657eb0864eb5530
-
SHA1
56f27b02a38df995e118ecbc59c4ba728d453c52
-
SHA256
6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518c
-
SHA512
124605ffca2f78f7995c8233a369216b38681db45d07618c78cc8a76ef8beb1eaa2493129dc4d588d2e24e27865e6704452527c6baf2507bb42880f2867e1eb1
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8aXn40KXZJnSKc1VD4PZyvMKtoEHQzMS:kTvC/MTQYxsWR7a34XXut8MvSu
Malware Config
Extracted
formbook
4.1
mtpi
noriel.top
fast-profit.xyz
octominer.shop
perm-donor-unitedkingdom.today
techtalks.live
car-deals-83345.bond
aviso-pontos.net
luxmarty.online
signes.info
coinshift.finance
lanangkia.fun
outdoorpatioumbrellastore.shop
kvasilkov.dev
aviatorgamesplay.xyz
seeasalstcornwalls.shop
erdekescortg.xyz
binhminhhoamaiaqst.site
sumeyramodam.xyz
42825.club
agriroccella.com
sisiwerbaa1.online
bao-showbiz.info
2403dmc07.top
buycott.live
bd1ry22n.xyz
mavilleconnectee.motorcycles
81582.ooo
smarminds.xyz
belivsh.top
rty5621.xyz
samudrabet-merdeka4.asia
d26htg.vip
tybcq.rest
ductlessconditionsilt.bond
polistudyour.top
u888z.info
megasensa88.pro
envisionsuccess.info
freelancetravel.asia
ev5px.cyou
theshop.build
allinathletes.pro
kylanyaboke.tech
x63jv178ot.bond
business-software-13225.bond
product-tester-jobs-95135.bond
ra-postk.top
yftrfw34.cfd
789btrangchu.buzz
zfbjr.top
izza-tools.shop
lgdiamonds.kaufen
runlikezombie.icu
goldent.day
fitflopshop.club
online-advertising-11374.bond
chouse.cyou
digitaladvertising.buzz
icymelts.direct
serherseershjrre.buzz
22324002.xyz
dommalapati.shop
excavators-69165.bond
runchat.app
canadaspostn-postecanadasd.top
Signatures
-
Formbook family
-
Formbook payload 4 IoCs
resource yara_rule behavioral1/memory/2308-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2308-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2308-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2596-16-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3020 set thread context of 2308 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 30 PID 2308 set thread context of 1232 2308 svchost.exe 21 PID 2308 set thread context of 1232 2308 svchost.exe 21 PID 2596 set thread context of 1232 2596 raserver.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2308 svchost.exe 2308 svchost.exe 2308 svchost.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe 2596 raserver.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 2308 svchost.exe 2308 svchost.exe 2308 svchost.exe 2308 svchost.exe 2596 raserver.exe 2596 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2308 svchost.exe Token: SeDebugPrivilege 2596 raserver.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2308 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 30 PID 3020 wrote to memory of 2308 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 30 PID 3020 wrote to memory of 2308 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 30 PID 3020 wrote to memory of 2308 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 30 PID 3020 wrote to memory of 2308 3020 6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe 30 PID 1232 wrote to memory of 2596 1232 Explorer.EXE 52 PID 1232 wrote to memory of 2596 1232 Explorer.EXE 52 PID 1232 wrote to memory of 2596 1232 Explorer.EXE 52 PID 1232 wrote to memory of 2596 1232 Explorer.EXE 52 PID 2596 wrote to memory of 2724 2596 raserver.exe 53 PID 2596 wrote to memory of 2724 2596 raserver.exe 53 PID 2596 wrote to memory of 2724 2596 raserver.exe 53 PID 2596 wrote to memory of 2724 2596 raserver.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe"C:\Users\Admin\AppData\Local\Temp\6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\6fa61458bfbe203417d600226fcf28b0cfbb4b48a9c066615bf7b5517ab1518cN.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2756
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3036
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2824
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2752
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2900
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2608
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2780
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:3032
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2928
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2912
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2168
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2968
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2860
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2624
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1956
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2740
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2820
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2772
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2656
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2716
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2600
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-