Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
9a513390d1b10efac55bf125607708a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9a513390d1b10efac55bf125607708a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9a513390d1b10efac55bf125607708a0N.exe
-
Size
392KB
-
MD5
9a513390d1b10efac55bf125607708a0
-
SHA1
40af9e5a55e0b8f11fb61ad101ca783070f6abbc
-
SHA256
67074890dc344540b57f14a3c614ef9bfe434602e4e17587958afa3e6f3af9a1
-
SHA512
21e3a1207cfc8b487581546bd5b213646c8f7c053884419ce387f4d9dabb14a02239594fb9c58d3a55a9baa69f5b1635066d4bd98729d190963da489d08f495a
-
SSDEEP
6144:RnGVON7t5oGZIuXu78j6MRUKj9vw06hM:355FmzW6yUKj9vw0
Malware Config
Extracted
formbook
3.8
pea
dadufu2011.com
aiqylw.com
nexteer.tech
lowellselvin.net
scoreretirementcommunity.com
7aonsc.com
poe-tools.site
wwwjinsha675.com
kyntenslocum.com
crazygore.com
wecreate.tech
oakmontappraisalcompany.com
aylaham.net
asianrecruitmentconsultants.com
hr-ziilabs.com
unwindthemind.biz
drivewaypatiocleaning.com
blekete.com
csfengsu.com
neuralmeshes.com
elizabethwymer.net
kinkytoybitch.com
etkintestcihazlari.com
wf2d.win
agentefaz.net
u1144.com
preciouspurchase.com
akclub.net
northatlantadermatology.com
designenc.com
tbrglv.men
juliebrims.com
tpitw.com
babyboxnow.com
200915.top
heinshukla.com
teambaker3.com
universidade-online.com
gaafidee.com
sunshinetravellers.com
gvvideocontrol.com
judysinteriorsource.com
colibrieventos.com
belegohtarware.com
ciil.zone
7012920.com
gxdic.com
bastugglobal.com
jackandjills.company
posey.tech
imbitasyon.biz
thminge.com
mtndewnationreward.com
biolynxtec.com
kunlunzs.com
365caidashi.com
whatisbrand.review
henwuren.com
finalcutlc.com
ebcca.com
macubia.com
www2998j.com
infinitewisdom.life
009gtg.info
fiscoray.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2704-2-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1708 set thread context of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a513390d1b10efac55bf125607708a0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 9a513390d1b10efac55bf125607708a0N.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1708 9a513390d1b10efac55bf125607708a0N.exe 1708 9a513390d1b10efac55bf125607708a0N.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1708 9a513390d1b10efac55bf125607708a0N.exe 1708 9a513390d1b10efac55bf125607708a0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 9a513390d1b10efac55bf125607708a0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30 PID 1708 wrote to memory of 2704 1708 9a513390d1b10efac55bf125607708a0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a513390d1b10efac55bf125607708a0N.exe"C:\Users\Admin\AppData\Local\Temp\9a513390d1b10efac55bf125607708a0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\9a513390d1b10efac55bf125607708a0N.exe"C:\Users\Admin\AppData\Local\Temp\9a513390d1b10efac55bf125607708a0N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-