Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/04/2025, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
bin-crypted-crypted.exe
Resource
win10v2004-20250410-en
General
-
Target
bin-crypted-crypted.exe
-
Size
2.4MB
-
MD5
ba011d330e84715b66989217075d100a
-
SHA1
9d56d3200232358ed6eeee2da3a19f829f9143be
-
SHA256
4465c322692f63b3ec6b5941be87017f1643e21e41df0b63afc618f5f8136208
-
SHA512
409acb2dc4a5d9aae7119d6882ebd851c925d0b8ae8dac941e371138804a31a08609d8013f08f249fff43750b78aa4d73118b2d23ba2d1e0dd390dc15865ce3e
-
SSDEEP
49152:5u5voq9yqVHncEylouiXCvkHDHewwtiw6ZA:5u5vPVHnfyNiXCvKDHe5tD6W
Malware Config
Extracted
formbook
4.1
jc27
uymygel.xyz
aregiver-services-test01.sbs
ouyin67gh.vip
lobalz.top
cl1ic4.pro
mconotc.top
hmm365.cfd
olonam.shop
ionnel.shop
ntroductorypage.info
einopumpify.net
hsnac.xyz
rameny.net
itness-apps1-s2025.sbs
nshulthakurdev.pro
iveawaywin.online
setobe.info
ostury.shop
5r03a.sbs
yota-blog.net
5381a6.app
acdzvx.top
raindeposits.info
gsp607.top
allbucdial.store
t615873tel.top
uckycasino88.net
oclywts.top
ol.autos
udm9p.cfd
arsonsales.online
0422.pet
94478.app
9ghaefscrnmu.shop
akery156mart.xyz
ogmuppets.top
-payret.shop
fcgroup.net
upcup.info
x3zig.sbs
port-eu.shop
sbjgu.cfd
01dt.top
4250017.xyz
yfreedom.lol
personegitim.xyz
acecarpg.vip
illavilavenue.xyz
2ap7moc06aou.xyz
rchi-architects.net
mretdoy.xyz
eucartaoflash.online
e-eaac.top
itfukt.net
agam77.net
4249874.xyz
85793.fit
ph63.info
oxupa.shop
arnaca.realestate
onarchglobalsecurityweb.info
gc6koahcyqn2y.xyz
1t2r1k8f.top
akalovwww.online
ingkersk8.store
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3384 set thread context of 4188 3384 bin-crypted-crypted.exe 78 PID 4188 set thread context of 3264 4188 RegAsm.exe 52 PID 5728 set thread context of 3264 5728 systray.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin-crypted-crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4188 RegAsm.exe 4188 RegAsm.exe 4188 RegAsm.exe 4188 RegAsm.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe 5728 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3264 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4188 RegAsm.exe 4188 RegAsm.exe 4188 RegAsm.exe 5728 systray.exe 5728 systray.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4188 RegAsm.exe Token: SeDebugPrivilege 5728 systray.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3384 wrote to memory of 4188 3384 bin-crypted-crypted.exe 78 PID 3384 wrote to memory of 4188 3384 bin-crypted-crypted.exe 78 PID 3384 wrote to memory of 4188 3384 bin-crypted-crypted.exe 78 PID 3384 wrote to memory of 4188 3384 bin-crypted-crypted.exe 78 PID 3384 wrote to memory of 4188 3384 bin-crypted-crypted.exe 78 PID 3384 wrote to memory of 4188 3384 bin-crypted-crypted.exe 78 PID 3264 wrote to memory of 5728 3264 Explorer.EXE 79 PID 3264 wrote to memory of 5728 3264 Explorer.EXE 79 PID 3264 wrote to memory of 5728 3264 Explorer.EXE 79 PID 5728 wrote to memory of 1492 5728 systray.exe 80 PID 5728 wrote to memory of 1492 5728 systray.exe 80 PID 5728 wrote to memory of 1492 5728 systray.exe 80
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\bin-crypted-crypted.exe"C:\Users\Admin\AppData\Local\Temp\bin-crypted-crypted.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-