Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe
Resource
win7-20240704-en
General
-
Target
cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe
-
Size
402KB
-
MD5
bb06ed23d87e32af51577a5c513154a4
-
SHA1
0465630ce40cd3eaf1e9f92daaccc16b9c3241e7
-
SHA256
cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944
-
SHA512
7915237ef8485cc63b57ce13adfffccf87510f896eac248299e3c5325c70a2e50b5657ed532ea09767c873d31afe3b956fbe807b6b4384ec6fa99836fb19d0a9
-
SSDEEP
6144:zmb3/3zvZ74J5spMIUYYKUeq7a/WUuufBvRiD5a:2v54Jq1B6L7UuupA
Malware Config
Extracted
formbook
4.1
rn10
kedai168et.com
mental-olympics.com
pussybuildsstrongbones.net
857691.shop
hisellers.net
exposurecophotography.com
beaded-boutique.net
wednesdayholdings.com
plesacv.xyz
manonlineros.com
a0204.shop
333689g.com
dyprl716h.xyz
pulseirabet.com
fnet.work
bo-2024-001-v1-d1.xyz
ongaurdsecurity.com
giulianacristini.com
miladamani.com
magicalrealmshopkeeper.online
dy62i.com
pfjxhzz.com
yieks.voto
wallseason.com
kclsec.xyz
findwineinspace.com
everydayoptics.com
pg15.top
schody.net
82647351.com
fluteindia.com
infominer.club
kedai168el.com
compuglobalhypermeganet.app
designs-by-syn.com
godmachines.net
play-fortuna-ahf.buzz
lyjxk.com
waysfundraising.online
topuptalkmore.com
jingalraid.cfd
stonebahis411.com
adonicfuran.xyz
5z1lcnbm.fun
ignitorite.com
375bey.xyz
oloutlets.com
jn66-com-opqrst99988.com
xins.live
buchstabieralphabet.info
sfazzino.com
facai86.xyz
rapidsignsystems.com
golightresins.com
fpsportsmedia.com
superpawbulous.com
qsigoqav.xyz
anshtiwari314.online
flood-risk.net
voegbedrijf-offerte.com
onliinnforrmmosa.com
duangendget.store
georgiausssa.xyz
boldmusicmgt.com
teamhore724.buzz
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2960-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4148 set thread context of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 2960 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 2960 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4148 wrote to memory of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97 PID 4148 wrote to memory of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97 PID 4148 wrote to memory of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97 PID 4148 wrote to memory of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97 PID 4148 wrote to memory of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97 PID 4148 wrote to memory of 2960 4148 cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe"C:\Users\Admin\AppData\Local\Temp\cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe"C:\Users\Admin\AppData\Local\Temp\cb723d514a98b4d825222314945c680011cf2ba21dafd5cd9129fe144083b944.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-