Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 07:31
Static task
static1
Behavioral task
behavioral1
Sample
7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe
Resource
win7-20240704-en
General
-
Target
7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe
-
Size
465KB
-
MD5
ea525b4bd2b17625c41dae5a5ace5443
-
SHA1
f09a072f32cb7228ce218de73a54cbf1b9665476
-
SHA256
7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475
-
SHA512
5ff381b1fec3027fe53b19f2f42af446482e5a60b04e8e6f64938d229a718d1d04153c0cb51ebe428add7821dde42c552568733b80fd848b5dddaf2e87675158
-
SSDEEP
12288:4xqYGKTd2BX88USFRszOIHy6LrrIs8hkM1E:WqKTd25UKk5LrIw
Malware Config
Extracted
formbook
4.1
h0gd
hispansud.com
sanslisin156.com
izmediajo.com
fukugyo-kuchicomi.net
zjzmkj.net
powerupinnovations.com
unigradecuracao.net
inspirasimagz.com
isaacnqwilliams.store
john316graphics.net
wcparadise.net
trejoblanco.com
100x100cultura.com
beedivinehomedecor.com
polant.xyz
ascrete.com
www23855.com
emmagx.com
rekotalent.biz
fersamultiservicios.com
omaniaa.net
olusiune.xyz
shtycatur.store
private-cars.net
madduxworks.com
edhl-sa.net
vivendodesorteios.online
hec-outfits.com
onlinepoojabooking.com
sofievermeulen.com
recargas-online-virtual.online
all-wedding.com
perfectbikeshort.com
travimall.com
kxctut2.xyz
somaijobs.net
thecyber.academy
official-yukitakaoka.com
winkletest.com
anlegerschutz.review
812664.com
uniqe-base.com
roofingcompanywarren.com
thbzjs.com
tracktelevision.com
rckt-api.com
therealmccoypdfcoffee.com
dalehollowoutdoors.com
childcaregameplan.com
starbonus7.com
mturko.com
genelyn.net
swapit.press
bathroomremodelingtips.net
v60010.xyz
propertyprotect.net
dealipal.com
savefrsaom.net
sepela-food.com
thepetvetlife.com
el-balcon.com
frenda.online
sutefisufeles.xyz
trillumtrillum.com
x-surcinetenerife.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3300-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3980 set thread context of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 3300 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108 PID 3980 wrote to memory of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108 PID 3980 wrote to memory of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108 PID 3980 wrote to memory of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108 PID 3980 wrote to memory of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108 PID 3980 wrote to memory of 3300 3980 7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe"C:\Users\Admin\AppData\Local\Temp\7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe"C:\Users\Admin\AppData\Local\Temp\7c1c972f058bd07c1b40b438e02744508eebbc081ecedbf9a530fee20bce4475.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-