Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe
Resource
win7-20240708-en
General
-
Target
c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe
-
Size
681KB
-
MD5
7aa9a6424157856428679fa6665b3276
-
SHA1
88f3a5b5cfc326bcb1fc9544af50e869c101c3c8
-
SHA256
c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f
-
SHA512
3446f3a8a2d1e06d0cac3f58f576d9329c906ac6befe561f1b46711b5e98e0b793ebbbd269b995b21026a72666496d45eec779c54109649418997c25a49adaee
-
SSDEEP
12288:vGZKzvnOBKYvI82Ok316ZjS5dN6cGc9oNkMS5cpSj3E4JfvafDpnqFU3:LOOXwpGT9uvA3Lhvar4FU3
Malware Config
Extracted
formbook
4.1
f19g
ppson.top
lacialshoals.sbs
871122.vip
ghase.fun
si.app
attsnew.net
iyafashion.shop
hfuj3u8a6me3.shop
3vw67fqfwnj.shop
lumbiz.xyz
fsh6j.shop
razydev.top
aronmart.shop
oreclosed-homes-82435.bond
ometria24.online
assinonet.online
j17b.xyz
-web-p501.buzz
olar-panels-1469027.zone
oecommerce.lol
rimepet.app
mbaksamudera.lol
pai.app
amalatshirts.shop
icholas-saaac.buzz
mscripts.online
23123kjjkfds.xyz
po07.biz
rediksijentoto.website
cripmz.xyz
rrabelly.shop
udangslot77.vip
estecocoricompany.net
ental-health-55454.bond
fk7f3.top
lpla.pro
eai.exchange
estvdo.pro
275dmy.top
hehungryphotographers.net
pp-games-deenviroutili.xyz
obility-scooters-63189.bond
iaorenzuochen.asia
ind-a-job1111.shop
eiliao625.pro
offeemachine07251.online
kreefil.online
obile-phones-20126.bond
48706673.top
anddtaxcredit.info
ua365.net
essonsbylevi.net
5457g.top
uhyaa.shop
4728171.rest
kyfix.best
arble-art.net
igdg.shop
pus.xyz
ringy.lol
zx9p6g3.forum
hisperchat.live
leaningjobssearch.today
estcontrols.pro
ranziin.shop
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/1464-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1748 set thread context of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1464 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30 PID 1748 wrote to memory of 1464 1748 c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe"C:\Users\Admin\AppData\Local\Temp\c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe"C:\Users\Admin\AppData\Local\Temp\c47ecbb9f13f48daa79ff7bc582625f238b8760f6a4fc542c0dcb6d2ffbec11f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-