Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe
Resource
win7-20240903-en
General
-
Target
3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe
-
Size
747KB
-
MD5
0ea5e86e132b0c1c7dfe9652eb801859
-
SHA1
6620f89e43c92f0dfa80561d22e3283a9c85b903
-
SHA256
3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751
-
SHA512
0a050902f257ccb762eb8b0941940d4a233a6acb2ab3a510c978c453640d293102faf2ab8825b03acd7ae45b230c3b5d60e4dc33c9dc09b6468cedabf569f529
-
SSDEEP
6144:J9H8pgcB5z9+GVQE4QvdU/57k2HKt8QO7r3Jy6RLiJRCH9ZUw+Rdu4Jfv5ccj678:f0qvQln2p9xERCHHUdRdxcioH1tU/b
Malware Config
Extracted
formbook
4.1
he2a
070001606.xyz
jesuseascriancas.online
as-eltransport.xyz
bankditalia-company.online
linkedin-stijngraat.online
sportsbetd.xyz
spanish-classes-76893.bond
infonation.pro
nxwzbze.forum
rush-pay.biz
fulfillmissions.lat
infolungcancer.xyz
aqario.xyz
omepro.solar
jackmanmueshl.shop
amcart.store
ishanaudichya.xyz
sun4rk.shop
depression-test-74287.bond
chipit.shop
aulagaminggear.shop
bxc3465.top
credit-rapide-sans-refus.bond
securesavings.ltd
hasanbasriuzun.shop
apolo77meledak.fun
notbokin.online
ethost.biz
cicek-suslemeleri.shop
fashionistahaven.net
opentelemetry.shop
bunny-decor.shop
mersar.fun
send-me-your-feet.pics
intap.shop
supergeoet.best
security-apps-89466.bond
ldentityone.net
b9h.pro
farms-sophon.xyz
shadow-walker.online
jjkdd.vip
yrotf.top
influencer-marketing-47216.bond
dfbfanclub.shop
quarterdeck.cfd
mexico-vacations-packages.today
online-gaming-66785.bond
crowsecurity.online
fmi-lostdevice.live
protesisdentalfijaprecio.bond
tcfsi.info
memecoin.vote
walk-in-tubs-65827.bond
linkvin777.top
serenitymassage.top
hostmyworld.net
searchgpt.world
blankmedspa.gallery
mattress-17708.bond
sedanghokiorg.info
funzone365.shop
metacuore.net
coldzero.top
sdcollections.shop
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/732-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3708 set thread context of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 732 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 732 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3708 wrote to memory of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95 PID 3708 wrote to memory of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95 PID 3708 wrote to memory of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95 PID 3708 wrote to memory of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95 PID 3708 wrote to memory of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95 PID 3708 wrote to memory of 732 3708 3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe"C:\Users\Admin\AppData\Local\Temp\3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe"C:\Users\Admin\AppData\Local\Temp\3c9bf33caa6aa11b1c87c50e1f0ae212744089508829a898bf7d9e7a3720d751.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-