Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe
Resource
win7-20240705-en
General
-
Target
a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe
-
Size
651KB
-
MD5
622fec48546a83b6c146074a7c6de40d
-
SHA1
3cc90d360795455fa69b6bf12ccf36ae0e09106e
-
SHA256
a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae
-
SHA512
fe3048d55396bfea180146a37225cd42f8bcc21cf56cec063f02fb5a48b52bf9f316a072adb6733fc52488b21987d4f19b0262010cc1caa803343785892bed04
-
SSDEEP
12288:3tJ6BgKTNRh02gF64s3leiYpIRsLI4L0i/xgQnrQstn8CMEaSLIMz+t:3tJofHgF83siW04L0i/xgKftn8CMEpLy
Malware Config
Extracted
formbook
4.1
de94
gx899.top
whoistommy.info
vabex.shop
vduwum.rest
betbox2351.com
ch3kat0.online
kaduexpress.com
sibonline.shop
bt365918.com
betterlabs.app
denversandandgravel.net
webzlp.xyz
tdodtn263q.xyz
zamaninvest.com
vcxwpo.xyz
myastrolyfe.com
lsm8v87jnkrqcnr.buzz
ilregnodellecozze.com
auroraskynholistics.com
sewassist.com
trafficbomber.com
grupocontigoalimentacion.com
game845.bet
amandaaustininteriors.com
shucka.xyz
sa98hd.xyz
yewlmfxt.xyz
soumayagreendevelopers.online
ciaochowciao.com
datafocuslab.com
jastastringfestival2023.com
bonktate.com
ko66.services
176981243862439370.xyz
socradex.com
utxlq6q.fun
bbsbras.com
phoenix-partners.net
whi.info
kingkong212.online
snapdashers.com
socalpropertymanagers.com
www843xz11.com
jihanshop.com
marillyaffewedding.com
grouplearning.net
bot888.vip
rdljx.com
pragmajobs.com
wakeywakey.xyz
cueconsultants.com
prosportsjourney.com
tetesa.xyz
velocimeterep.com
ltjlh.com
beton24naro-fominsk.online
firstcitypr.com
tires-fast.store
li00.icu
pinkineverything.com
jvkw3r8qi6kf67e.buzz
yc92w.top
gk64.top
176123.photos
azublog1.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2140-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2968 set thread context of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2140 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2968 wrote to memory of 2140 2968 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 30 PID 2140 wrote to memory of 2504 2140 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 31 PID 2140 wrote to memory of 2504 2140 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 31 PID 2140 wrote to memory of 2504 2140 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 31 PID 2140 wrote to memory of 2504 2140 a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe"C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe"C:\Users\Admin\AppData\Local\Temp\a96c7253cab161d289efdea709091608649deeb1423a4df65d1cd13ad28642ae.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 363⤵
- Program crash
PID:2504
-
-