Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe
Resource
win7-20240903-en
General
-
Target
a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe
-
Size
638KB
-
MD5
b5c5bfa486e42a1f753a993f5fd4c850
-
SHA1
a6e3226e45c448c599bcc694a81ff9dc5d7b05b3
-
SHA256
a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89
-
SHA512
fcae4141137f6ccb4210564a16d88c6ffa46addb6d83e435362141219374d7c22b3af2b8f6c9ceb0cbc8568348cb2cdaa1a3af40ab09188d6bb53b5de0338f33
-
SSDEEP
12288:BhhwoIc0qIL6oPA6bBOcMLyNjYzRIvcjZoUMNA7MCoORaEZ/zy4KBX:BbwoIc0qIk6bBOJyN4pZNKA4sbdc
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2852-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 588 set thread context of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2852 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30 PID 588 wrote to memory of 2852 588 a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe"C:\Users\Admin\AppData\Local\Temp\a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe"C:\Users\Admin\AppData\Local\Temp\a1ce25c899ff86db4e54d042569e0a996d399dcc9a701b551999b1edeb2acb89.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-