Analysis
-
max time kernel
299s -
max time network
284s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
bin-crypted-crypted.exe
Resource
win10v2004-20250314-en
General
-
Target
bin-crypted-crypted.exe
-
Size
2.4MB
-
MD5
ba011d330e84715b66989217075d100a
-
SHA1
9d56d3200232358ed6eeee2da3a19f829f9143be
-
SHA256
4465c322692f63b3ec6b5941be87017f1643e21e41df0b63afc618f5f8136208
-
SHA512
409acb2dc4a5d9aae7119d6882ebd851c925d0b8ae8dac941e371138804a31a08609d8013f08f249fff43750b78aa4d73118b2d23ba2d1e0dd390dc15865ce3e
-
SSDEEP
49152:5u5voq9yqVHncEylouiXCvkHDHewwtiw6ZA:5u5vPVHnfyNiXCvKDHe5tD6W
Malware Config
Extracted
formbook
4.1
jc27
uymygel.xyz
aregiver-services-test01.sbs
ouyin67gh.vip
lobalz.top
cl1ic4.pro
mconotc.top
hmm365.cfd
olonam.shop
ionnel.shop
ntroductorypage.info
einopumpify.net
hsnac.xyz
rameny.net
itness-apps1-s2025.sbs
nshulthakurdev.pro
iveawaywin.online
setobe.info
ostury.shop
5r03a.sbs
yota-blog.net
5381a6.app
acdzvx.top
raindeposits.info
gsp607.top
allbucdial.store
t615873tel.top
uckycasino88.net
oclywts.top
ol.autos
udm9p.cfd
arsonsales.online
0422.pet
94478.app
9ghaefscrnmu.shop
akery156mart.xyz
ogmuppets.top
-payret.shop
fcgroup.net
upcup.info
x3zig.sbs
port-eu.shop
sbjgu.cfd
01dt.top
4250017.xyz
yfreedom.lol
personegitim.xyz
acecarpg.vip
illavilavenue.xyz
2ap7moc06aou.xyz
rchi-architects.net
mretdoy.xyz
eucartaoflash.online
e-eaac.top
itfukt.net
agam77.net
4249874.xyz
85793.fit
ph63.info
oxupa.shop
arnaca.realestate
onarchglobalsecurityweb.info
gc6koahcyqn2y.xyz
1t2r1k8f.top
akalovwww.online
ingkersk8.store
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4836 set thread context of 2876 4836 bin-crypted-crypted.exe 86 PID 2876 set thread context of 3504 2876 RegAsm.exe 56 PID 2876 set thread context of 3504 2876 RegAsm.exe 56 PID 5004 set thread context of 3504 5004 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin-crypted-crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 5004 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 RegAsm.exe 2876 RegAsm.exe 2876 RegAsm.exe 2876 RegAsm.exe 2876 RegAsm.exe 2876 RegAsm.exe 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE 5004 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3504 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2876 RegAsm.exe 2876 RegAsm.exe 2876 RegAsm.exe 2876 RegAsm.exe 5004 NETSTAT.EXE 5004 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2876 RegAsm.exe Token: SeDebugPrivilege 5004 NETSTAT.EXE Token: SeShutdownPrivilege 3504 Explorer.EXE Token: SeCreatePagefilePrivilege 3504 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3504 Explorer.EXE 3504 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3504 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4836 wrote to memory of 2876 4836 bin-crypted-crypted.exe 86 PID 4836 wrote to memory of 2876 4836 bin-crypted-crypted.exe 86 PID 4836 wrote to memory of 2876 4836 bin-crypted-crypted.exe 86 PID 4836 wrote to memory of 2876 4836 bin-crypted-crypted.exe 86 PID 4836 wrote to memory of 2876 4836 bin-crypted-crypted.exe 86 PID 4836 wrote to memory of 2876 4836 bin-crypted-crypted.exe 86 PID 3504 wrote to memory of 5004 3504 Explorer.EXE 96 PID 3504 wrote to memory of 5004 3504 Explorer.EXE 96 PID 3504 wrote to memory of 5004 3504 Explorer.EXE 96 PID 5004 wrote to memory of 1968 5004 NETSTAT.EXE 99 PID 5004 wrote to memory of 1968 5004 NETSTAT.EXE 99 PID 5004 wrote to memory of 1968 5004 NETSTAT.EXE 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\bin-crypted-crypted.exe"C:\Users\Admin\AppData\Local\Temp\bin-crypted-crypted.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-