Analysis
-
max time kernel
131s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe
Resource
win7-20240708-en
General
-
Target
d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe
-
Size
622KB
-
MD5
23b359fd43f7e0a663007671601efa72
-
SHA1
7e848ca75edc87be39185399fc6888cacbb94fc4
-
SHA256
d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86
-
SHA512
51bfd603ad20235cd9faad812915f028d21c164a64d7e535b4663ea2eb52324350585ce52604387bc489590128621d918464ca28c203b9aae89f764bc70d7820
-
SSDEEP
12288:NiuaKWgPg9M4AzmHJoQNo9hP+RRsf9uL1tEEE8TRAmxH:0ngo9M4AqA9h2RRQ23PnTRAm
Malware Config
Extracted
formbook
4.1
v15n
dyahwoahjuk.store
toysstorm.com
y7rak9.com
2222233p6.shop
betbox2341.com
visualvarta.com
nijssenadventures.com
main-12.site
leng4d.net
kurainu.xyz
hatesa.xyz
culturamosaica.com
supermallify.store
gigboard.app
rxforgive.com
ameliestones.com
kapalwin.live
tier.credit
sobol-ksa.com
faredeal.online
226b.xyz
talktohannaford500.shop
mxrkpkngishbdss.xyz
mirotcg.info
turbo3club.site
hjnd28t010cop.cyou
marveloustep.shop
syedlatief.com
comfortableleather.com
alltradescortland.com
dnwgt80508yoec8pzq.top
kedai168ef.com
gelgoodlife.com
nxtskey.com
milliedevine.store
wordcraftart.fun
mpo525.monster
bt365851.com
dogeversetoken.net
boostgrowmode.com
dacapital.net
project21il.com
go4stores.com
brunoduarte.online
sexgodmasterclass.com
wuhey.shop
jdginl892e.xyz
agenkilat-official.space
hacks.digital
suv.xyz
fwbsmg.life
vicmvm649n.top
wbahdfw.icu
creativelyloud.com
merrycleanteam.com
solar-systems-panels-58747.bond
rotaryclubofmukono.com
bethanyumcnola.info
breezafan.com
ny-robotictoys.com
lawyers-br-pt-9390663.fyi
neurasaudi.com
dgccb.com
sayuri-walk.com
gtur.top
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3164-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 224 set thread context of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3164 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 3164 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 3164 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 224 wrote to memory of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102 PID 224 wrote to memory of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102 PID 224 wrote to memory of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102 PID 224 wrote to memory of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102 PID 224 wrote to memory of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102 PID 224 wrote to memory of 3164 224 d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe"C:\Users\Admin\AppData\Local\Temp\d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe"C:\Users\Admin\AppData\Local\Temp\d2b2b2ae2cf256bec969052f108726d12ce6f84a2ca91f4baf4683a5bb331c86.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4356,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:81⤵PID:4880