Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
rAXDBwN46Wuxlc8.exe
Resource
win7-20240611-en
General
-
Target
rAXDBwN46Wuxlc8.exe
-
Size
593KB
-
MD5
1c35913e1129c47ca535b3aea8d90078
-
SHA1
35f1cbcd7a52a3e1441d0f8cd67076e75b260b7a
-
SHA256
9c5ada1bea0116faaa4cb16f966f2fa5af05d79293b2cb3b953d22d0d17ae680
-
SHA512
a06df95313ed8708aaa34674041b3fe75122574ae334b69295ea049c110e5893143cd0ccfb0140eecebe7c15ed518e6c90a5f978569ba417fed41333d85dfe8d
-
SSDEEP
12288:V0JJwqLx/cHWzonE/DpX3Rx3UOMkPwCJTNmSWEtUP8XcoESZRYT57:VZtHEdX3H3eCJTNGrYXY
Malware Config
Extracted
formbook
4.1
dy13
manga-house.com
kjsdhklssk51.xyz
b0ba138.xyz
bt365033.com
ccbsinc.net
mrwine.xyz
nrxkrd527o.xyz
hoshi.social
1912ai.com
serco2020.com
byfchfyr.xyz
imuschestvostorgov.online
austinheafey.com
mrdfa.club
883106.photos
profitablefxmarkets.com
taini00.net
brye.top
ginsm.com
sportglid.com
hdretailllc.com
umeshraja.com
bum-arch.com
carefulapp.com
kjqlq.top
3dsciagames.com
520yhy.com
magahatinu.com
freedompopo.com
directgaragedoor.com
tyupok.xyz
thecrystore.com
camperelektrikde.shop
soloparentconnect.com
sonderfullcoaching.com
jesuscrewofficial.com
oioc.xyz
assineunitv.com
whysco.com
484844.vip
gdctus840t.top
acc-pay.top
bdsmnutzbar.info
sdplat.media
cioncarp4213.com
facecasino2.top
bankablebark.com
gulerweb.online
radheyranidailyproduct.com
fin4d-sl.com
northshorehousekeeping.com
femmeteefatale.com
d0ge6or54x07cfn.xyz
craftwhirl.com
kgfna.biz
real-estate-96841.bond
cfuhtkwo.xyz
nestormediaproduction.com
txglobedev.com
kermoal.dev
yr8gl32.vip
bathroomremodelnearyou.today
nearmeacupuncture.com
chicstop.store
cpuk-finance.com
Signatures
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1408-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1408-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1584-23-0x0000000000450000-0x000000000047F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rAXDBwN46Wuxlc8.exerAXDBwN46Wuxlc8.execmmon32.exedescription pid process target process PID 3440 set thread context of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 1408 set thread context of 3432 1408 rAXDBwN46Wuxlc8.exe Explorer.EXE PID 1584 set thread context of 3432 1584 cmmon32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
rAXDBwN46Wuxlc8.execmmon32.exepid process 1408 rAXDBwN46Wuxlc8.exe 1408 rAXDBwN46Wuxlc8.exe 1408 rAXDBwN46Wuxlc8.exe 1408 rAXDBwN46Wuxlc8.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe 1584 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
rAXDBwN46Wuxlc8.execmmon32.exepid process 1408 rAXDBwN46Wuxlc8.exe 1408 rAXDBwN46Wuxlc8.exe 1408 rAXDBwN46Wuxlc8.exe 1584 cmmon32.exe 1584 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rAXDBwN46Wuxlc8.execmmon32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1408 rAXDBwN46Wuxlc8.exe Token: SeDebugPrivilege 1584 cmmon32.exe Token: SeShutdownPrivilege 3432 Explorer.EXE Token: SeCreatePagefilePrivilege 3432 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
rAXDBwN46Wuxlc8.exeExplorer.EXEcmmon32.exedescription pid process target process PID 3440 wrote to memory of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 3440 wrote to memory of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 3440 wrote to memory of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 3440 wrote to memory of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 3440 wrote to memory of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 3440 wrote to memory of 1408 3440 rAXDBwN46Wuxlc8.exe rAXDBwN46Wuxlc8.exe PID 3432 wrote to memory of 1584 3432 Explorer.EXE cmmon32.exe PID 3432 wrote to memory of 1584 3432 Explorer.EXE cmmon32.exe PID 3432 wrote to memory of 1584 3432 Explorer.EXE cmmon32.exe PID 1584 wrote to memory of 4104 1584 cmmon32.exe cmd.exe PID 1584 wrote to memory of 4104 1584 cmmon32.exe cmd.exe PID 1584 wrote to memory of 4104 1584 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rAXDBwN46Wuxlc8.exe"C:\Users\Admin\AppData\Local\Temp\rAXDBwN46Wuxlc8.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rAXDBwN46Wuxlc8.exe"C:\Users\Admin\AppData\Local\Temp\rAXDBwN46Wuxlc8.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rAXDBwN46Wuxlc8.exe"3⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1408-13-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1408-18-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1408-19-0x0000000001330000-0x0000000001345000-memory.dmpFilesize
84KB
-
memory/1408-16-0x0000000000EB0000-0x00000000011FA000-memory.dmpFilesize
3.3MB
-
memory/1584-23-0x0000000000450000-0x000000000047F000-memory.dmpFilesize
188KB
-
memory/1584-21-0x0000000000170000-0x000000000017C000-memory.dmpFilesize
48KB
-
memory/1584-22-0x0000000000170000-0x000000000017C000-memory.dmpFilesize
48KB
-
memory/3432-32-0x0000000008690000-0x0000000008791000-memory.dmpFilesize
1.0MB
-
memory/3432-29-0x0000000008690000-0x0000000008791000-memory.dmpFilesize
1.0MB
-
memory/3432-28-0x0000000008690000-0x0000000008791000-memory.dmpFilesize
1.0MB
-
memory/3432-25-0x0000000002D90000-0x0000000002E7D000-memory.dmpFilesize
948KB
-
memory/3432-20-0x0000000002D90000-0x0000000002E7D000-memory.dmpFilesize
948KB
-
memory/3440-6-0x0000000005710000-0x000000000571A000-memory.dmpFilesize
40KB
-
memory/3440-7-0x0000000006350000-0x000000000687C000-memory.dmpFilesize
5.2MB
-
memory/3440-15-0x0000000075210000-0x00000000759C0000-memory.dmpFilesize
7.7MB
-
memory/3440-11-0x00000000074C0000-0x00000000074CC000-memory.dmpFilesize
48KB
-
memory/3440-10-0x00000000074A0000-0x00000000074B0000-memory.dmpFilesize
64KB
-
memory/3440-9-0x00000000072F0000-0x000000000737A000-memory.dmpFilesize
552KB
-
memory/3440-8-0x0000000005F10000-0x0000000005FAC000-memory.dmpFilesize
624KB
-
memory/3440-12-0x00000000074E0000-0x0000000007556000-memory.dmpFilesize
472KB
-
memory/3440-0-0x000000007521E000-0x000000007521F000-memory.dmpFilesize
4KB
-
memory/3440-5-0x0000000075210000-0x00000000759C0000-memory.dmpFilesize
7.7MB
-
memory/3440-4-0x0000000005310000-0x0000000005664000-memory.dmpFilesize
3.3MB
-
memory/3440-3-0x0000000005270000-0x0000000005302000-memory.dmpFilesize
584KB
-
memory/3440-2-0x0000000005780000-0x0000000005D24000-memory.dmpFilesize
5.6MB
-
memory/3440-1-0x0000000000770000-0x000000000080A000-memory.dmpFilesize
616KB