Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe
Resource
win7-20240729-en
General
-
Target
299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe
-
Size
252KB
-
MD5
140c67ee8edcfc2c04ea4312e95f80e0
-
SHA1
6bed70dbf578dbb8befc44987ad8b5784a5dafb0
-
SHA256
299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66
-
SHA512
0b2c4a2cc7acce08738e30dd4616f4a32fc187042ffb0c9b8412dad56ee702fedc22581149d8eab6cf3e1da9953f698ca8053757a1daebeedd0087b596c27479
-
SSDEEP
6144:3lBfxXRVUCFo7xHJ7SmvHRVz4JmDlbiwv:33VUCFotHJ7SwnzHpl
Malware Config
Extracted
formbook
3.6
pe
ilikeshoping.com
websitetestingservices.com
tantradesoie.com
narcissistory.com
fapgame.net
iryrv.info
contextre.com
mosala24.com
alienpokeragent.com
lqjwq.com
musica.solar
tipsatransporte.com
kawanparjo.com
onsideadvisers.com
rpwfj.com
9ldhh.info
dancewithsalsadivina.com
resurfjeans.online
smoke-cicle.com
battery365.net
scooterswap.amsterdam
best-dentureimplant.market
overtheaircare.com
tokenfi.com
hnzhenlan.com
pjwmqw.info
1c-online.com
360giveaways.com
wwwblh7788.com
has.link
transtyleshop.com
comibaha70.win
slothgrrl.com
butchwoodmarketingpro.com
starcitizenships.online
taughtso.com
pppav64641.com
derektrowellarchitect.com
goodsystem4update.review
gfkdmulj.download
churchofhighertruth.com
millioncoinshomepage.com
thecraftforums.net
cloutlifestyle.com
ethforward.com
thetravelingmillennials.com
gsjxdpos.com
electricfuses.com
aizee43.com
luxury-voyagenow.live
metbooster.com
mias-kitchen-corner.com
theartistanarchy.com
project.media
cbd2.win
zaumfilm.com
wugumihu.net
gardenorr.com
xn--6oq76h2wq156ag5fp4ih9n.com
yessshunny.com
greenlifestrategies.net
sosomei.com
superiorsleather.com
richardsatelier.com
tingmain.info
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2504-4-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ungirt.vbe 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2504 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31 PID 2544 wrote to memory of 2504 2544 299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe"C:\Users\Admin\AppData\Local\Temp\299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe"C:\Users\Admin\AppData\Local\Temp\299dd5c3192a96d29e2eacb650c5235a4aadc3e7ec921e89940fb77519700d66.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-