Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-09-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe
Resource
win7-20240903-en
General
-
Target
9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe
-
Size
684KB
-
MD5
a2d4be5c186159147645f2ff6ee1f690
-
SHA1
1799cfb6c5ca5224d72d7f1696ad36c2624fd057
-
SHA256
9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c
-
SHA512
29b5307b7d05827b6c6bb8489357d6abbd8e293dd56a6f6a65d2af59111fbb9e0aa2a786ce0690b5eea6c025e3e78523c5cc7a193cf23dfb4f95863a94aa44b0
-
SSDEEP
12288:mdODvVloha83lbhzRbIniLawF+poiDsv6z6ViEqtwsdf9i72l4:XyhaUlVzRlqpEv6z6ViZm0fkE4
Malware Config
Extracted
formbook
4.1
he2a
070001606.xyz
jesuseascriancas.online
as-eltransport.xyz
bankditalia-company.online
linkedin-stijngraat.online
sportsbetd.xyz
spanish-classes-76893.bond
infonation.pro
nxwzbze.forum
rush-pay.biz
fulfillmissions.lat
infolungcancer.xyz
aqario.xyz
omepro.solar
jackmanmueshl.shop
amcart.store
ishanaudichya.xyz
sun4rk.shop
depression-test-74287.bond
chipit.shop
aulagaminggear.shop
bxc3465.top
credit-rapide-sans-refus.bond
securesavings.ltd
hasanbasriuzun.shop
apolo77meledak.fun
notbokin.online
ethost.biz
cicek-suslemeleri.shop
fashionistahaven.net
opentelemetry.shop
bunny-decor.shop
mersar.fun
send-me-your-feet.pics
intap.shop
supergeoet.best
security-apps-89466.bond
ldentityone.net
b9h.pro
farms-sophon.xyz
shadow-walker.online
jjkdd.vip
yrotf.top
influencer-marketing-47216.bond
dfbfanclub.shop
quarterdeck.cfd
mexico-vacations-packages.today
online-gaming-66785.bond
crowsecurity.online
fmi-lostdevice.live
protesisdentalfijaprecio.bond
tcfsi.info
memecoin.vote
walk-in-tubs-65827.bond
linkvin777.top
serenitymassage.top
hostmyworld.net
searchgpt.world
blankmedspa.gallery
mattress-17708.bond
sedanghokiorg.info
funzone365.shop
metacuore.net
coldzero.top
sdcollections.shop
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2236-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 2236 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1356 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 31 PID 2348 wrote to memory of 1356 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 31 PID 2348 wrote to memory of 1356 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 31 PID 2348 wrote to memory of 1356 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 31 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32 PID 2348 wrote to memory of 2236 2348 9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe"C:\Users\Admin\AppData\Local\Temp\9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe"C:\Users\Admin\AppData\Local\Temp\9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe"2⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe"C:\Users\Admin\AppData\Local\Temp\9f67248a754e414ffb2361932c591abe39581b21a20d51ccb46db5e534a9531c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-