Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe
Resource
win7-20240903-en
General
-
Target
3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe
-
Size
770KB
-
MD5
00f166485a5b7506eacbc8a738a2d395
-
SHA1
6ef86605b307b98eadaf156856ec083d50a1165d
-
SHA256
3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de
-
SHA512
2cc89a97f5f45cc057f3ee603cc063e2aea8dad9f11f416dfad28f20d08b9cb6a2504d01c5fcfbf50de904290d5e82098065f8ddbe59eaac4c4f621481dac8af
-
SSDEEP
12288:+sW1UoIG5MPUhlym+48U6f5sTvXeZkA76XYH9QLqgbfe23:OUobywl9+pUFOZkA+IH9Qnbf73
Malware Config
Extracted
formbook
4.1
he2a
070001606.xyz
jesuseascriancas.online
as-eltransport.xyz
bankditalia-company.online
linkedin-stijngraat.online
sportsbetd.xyz
spanish-classes-76893.bond
infonation.pro
nxwzbze.forum
rush-pay.biz
fulfillmissions.lat
infolungcancer.xyz
aqario.xyz
omepro.solar
jackmanmueshl.shop
amcart.store
ishanaudichya.xyz
sun4rk.shop
depression-test-74287.bond
chipit.shop
aulagaminggear.shop
bxc3465.top
credit-rapide-sans-refus.bond
securesavings.ltd
hasanbasriuzun.shop
apolo77meledak.fun
notbokin.online
ethost.biz
cicek-suslemeleri.shop
fashionistahaven.net
opentelemetry.shop
bunny-decor.shop
mersar.fun
send-me-your-feet.pics
intap.shop
supergeoet.best
security-apps-89466.bond
ldentityone.net
b9h.pro
farms-sophon.xyz
shadow-walker.online
jjkdd.vip
yrotf.top
influencer-marketing-47216.bond
dfbfanclub.shop
quarterdeck.cfd
mexico-vacations-packages.today
online-gaming-66785.bond
crowsecurity.online
fmi-lostdevice.live
protesisdentalfijaprecio.bond
tcfsi.info
memecoin.vote
walk-in-tubs-65827.bond
linkvin777.top
serenitymassage.top
hostmyworld.net
searchgpt.world
blankmedspa.gallery
mattress-17708.bond
sedanghokiorg.info
funzone365.shop
metacuore.net
coldzero.top
sdcollections.shop
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3172-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3184 set thread context of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3172 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 3172 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3184 wrote to memory of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93 PID 3184 wrote to memory of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93 PID 3184 wrote to memory of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93 PID 3184 wrote to memory of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93 PID 3184 wrote to memory of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93 PID 3184 wrote to memory of 3172 3184 3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe"C:\Users\Admin\AppData\Local\Temp\3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe"C:\Users\Admin\AppData\Local\Temp\3e4d309ea6393d0740a3bd93c83b208ac59b3ddf2626bb279942ac48003454de.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-