Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 12:04
Static task
static1
Behavioral task
behavioral1
Sample
81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe
Resource
win7-20240903-en
General
-
Target
81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe
-
Size
1.8MB
-
MD5
ee81ac4809d750a020d8f5352660a3a9
-
SHA1
22539d8281651cdaecba74e69a26ec9339b42ca6
-
SHA256
81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06
-
SHA512
c113eef3a01cf0e341981c1f3c529d9d3e9d47e80b4a2c3854f099e2c4744a3b9225a41d53b5ed9d58dfc7a79cefa6b3006baa6b2a623dccbfeb340a1a4d2483
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8aXn40KXZJnSKc1VD4PZyvMKtoEHQzMSm:kTvC/MTQYxsWR7a34XXut8MvSu7
Malware Config
Extracted
formbook
4.1
mtpi
noriel.top
fast-profit.xyz
octominer.shop
perm-donor-unitedkingdom.today
techtalks.live
car-deals-83345.bond
aviso-pontos.net
luxmarty.online
signes.info
coinshift.finance
lanangkia.fun
outdoorpatioumbrellastore.shop
kvasilkov.dev
aviatorgamesplay.xyz
seeasalstcornwalls.shop
erdekescortg.xyz
binhminhhoamaiaqst.site
sumeyramodam.xyz
42825.club
agriroccella.com
sisiwerbaa1.online
bao-showbiz.info
2403dmc07.top
buycott.live
bd1ry22n.xyz
mavilleconnectee.motorcycles
81582.ooo
smarminds.xyz
belivsh.top
rty5621.xyz
samudrabet-merdeka4.asia
d26htg.vip
tybcq.rest
ductlessconditionsilt.bond
polistudyour.top
u888z.info
megasensa88.pro
envisionsuccess.info
freelancetravel.asia
ev5px.cyou
theshop.build
allinathletes.pro
kylanyaboke.tech
x63jv178ot.bond
business-software-13225.bond
product-tester-jobs-95135.bond
ra-postk.top
yftrfw34.cfd
789btrangchu.buzz
zfbjr.top
izza-tools.shop
lgdiamonds.kaufen
runlikezombie.icu
goldent.day
fitflopshop.club
online-advertising-11374.bond
chouse.cyou
digitaladvertising.buzz
icymelts.direct
serherseershjrre.buzz
22324002.xyz
dommalapati.shop
excavators-69165.bond
runchat.app
canadaspostn-postecanadasd.top
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/1376-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1376-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4272-12-0x0000000001020000-0x000000000104F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4932 set thread context of 1376 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 83 PID 1376 set thread context of 3556 1376 svchost.exe 56 PID 4272 set thread context of 3556 4272 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe 4272 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 4272 wlanext.exe 4272 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 svchost.exe Token: SeDebugPrivilege 4272 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1376 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 83 PID 4932 wrote to memory of 1376 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 83 PID 4932 wrote to memory of 1376 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 83 PID 4932 wrote to memory of 1376 4932 81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe 83 PID 3556 wrote to memory of 4272 3556 Explorer.EXE 84 PID 3556 wrote to memory of 4272 3556 Explorer.EXE 84 PID 3556 wrote to memory of 4272 3556 Explorer.EXE 84 PID 4272 wrote to memory of 2564 4272 wlanext.exe 86 PID 4272 wrote to memory of 2564 4272 wlanext.exe 86 PID 4272 wrote to memory of 2564 4272 wlanext.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe"C:\Users\Admin\AppData\Local\Temp\81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\81d084766416a6762ad6d6fcb2ac7887190c6261c175357ccda9582605846a06.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-