Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2025, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
bin-crypted-crypted.exe
Resource
win10v2004-20250410-en
General
-
Target
bin-crypted-crypted.exe
-
Size
2.4MB
-
MD5
ba011d330e84715b66989217075d100a
-
SHA1
9d56d3200232358ed6eeee2da3a19f829f9143be
-
SHA256
4465c322692f63b3ec6b5941be87017f1643e21e41df0b63afc618f5f8136208
-
SHA512
409acb2dc4a5d9aae7119d6882ebd851c925d0b8ae8dac941e371138804a31a08609d8013f08f249fff43750b78aa4d73118b2d23ba2d1e0dd390dc15865ce3e
-
SSDEEP
49152:5u5voq9yqVHncEylouiXCvkHDHewwtiw6ZA:5u5vPVHnfyNiXCvKDHe5tD6W
Malware Config
Extracted
formbook
4.1
jc27
uymygel.xyz
aregiver-services-test01.sbs
ouyin67gh.vip
lobalz.top
cl1ic4.pro
mconotc.top
hmm365.cfd
olonam.shop
ionnel.shop
ntroductorypage.info
einopumpify.net
hsnac.xyz
rameny.net
itness-apps1-s2025.sbs
nshulthakurdev.pro
iveawaywin.online
setobe.info
ostury.shop
5r03a.sbs
yota-blog.net
5381a6.app
acdzvx.top
raindeposits.info
gsp607.top
allbucdial.store
t615873tel.top
uckycasino88.net
oclywts.top
ol.autos
udm9p.cfd
arsonsales.online
0422.pet
94478.app
9ghaefscrnmu.shop
akery156mart.xyz
ogmuppets.top
-payret.shop
fcgroup.net
upcup.info
x3zig.sbs
port-eu.shop
sbjgu.cfd
01dt.top
4250017.xyz
yfreedom.lol
personegitim.xyz
acecarpg.vip
illavilavenue.xyz
2ap7moc06aou.xyz
rchi-architects.net
mretdoy.xyz
eucartaoflash.online
e-eaac.top
itfukt.net
agam77.net
4249874.xyz
85793.fit
ph63.info
oxupa.shop
arnaca.realestate
onarchglobalsecurityweb.info
gc6koahcyqn2y.xyz
1t2r1k8f.top
akalovwww.online
ingkersk8.store
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 6012 set thread context of 4380 6012 bin-crypted-crypted.exe 84 PID 4380 set thread context of 3464 4380 RegAsm.exe 56 PID 700 set thread context of 3464 700 systray.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin-crypted-crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4380 RegAsm.exe 4380 RegAsm.exe 4380 RegAsm.exe 4380 RegAsm.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe 700 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3464 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4380 RegAsm.exe 4380 RegAsm.exe 4380 RegAsm.exe 700 systray.exe 700 systray.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4380 RegAsm.exe Token: SeDebugPrivilege 700 systray.exe Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE Token: SeShutdownPrivilege 3464 Explorer.EXE Token: SeCreatePagefilePrivilege 3464 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3464 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 6012 wrote to memory of 4380 6012 bin-crypted-crypted.exe 84 PID 6012 wrote to memory of 4380 6012 bin-crypted-crypted.exe 84 PID 6012 wrote to memory of 4380 6012 bin-crypted-crypted.exe 84 PID 6012 wrote to memory of 4380 6012 bin-crypted-crypted.exe 84 PID 6012 wrote to memory of 4380 6012 bin-crypted-crypted.exe 84 PID 6012 wrote to memory of 4380 6012 bin-crypted-crypted.exe 84 PID 3464 wrote to memory of 700 3464 Explorer.EXE 88 PID 3464 wrote to memory of 700 3464 Explorer.EXE 88 PID 3464 wrote to memory of 700 3464 Explorer.EXE 88 PID 700 wrote to memory of 4464 700 systray.exe 92 PID 700 wrote to memory of 4464 700 systray.exe 92 PID 700 wrote to memory of 4464 700 systray.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\bin-crypted-crypted.exe"C:\Users\Admin\AppData\Local\Temp\bin-crypted-crypted.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:212
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4464
-
-