Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe
Resource
win7-20240903-en
General
-
Target
761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe
-
Size
759KB
-
MD5
6341110aa0627431093ef3c502f65669
-
SHA1
12dd6b363e9d841bce3fd0c007b1e84796909149
-
SHA256
761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0
-
SHA512
2aee95c0f40f86f6c505cabeb2797aab5e587b3021c40156c2f5bff0ebc5d6787c5975a1978a4747a303e7cdba637498bac923a7e633931dd79b62feffaa8224
-
SSDEEP
12288:IQ11UoIG5MPUNDguQL6/Vt+uIMtBLn6TnfymJVDgP5BhMW+:lUobySgu26t/IMt16OmJidMW+
Malware Config
Extracted
formbook
4.1
he2a
070001606.xyz
jesuseascriancas.online
as-eltransport.xyz
bankditalia-company.online
linkedin-stijngraat.online
sportsbetd.xyz
spanish-classes-76893.bond
infonation.pro
nxwzbze.forum
rush-pay.biz
fulfillmissions.lat
infolungcancer.xyz
aqario.xyz
omepro.solar
jackmanmueshl.shop
amcart.store
ishanaudichya.xyz
sun4rk.shop
depression-test-74287.bond
chipit.shop
aulagaminggear.shop
bxc3465.top
credit-rapide-sans-refus.bond
securesavings.ltd
hasanbasriuzun.shop
apolo77meledak.fun
notbokin.online
ethost.biz
cicek-suslemeleri.shop
fashionistahaven.net
opentelemetry.shop
bunny-decor.shop
mersar.fun
send-me-your-feet.pics
intap.shop
supergeoet.best
security-apps-89466.bond
ldentityone.net
b9h.pro
farms-sophon.xyz
shadow-walker.online
jjkdd.vip
yrotf.top
influencer-marketing-47216.bond
dfbfanclub.shop
quarterdeck.cfd
mexico-vacations-packages.today
online-gaming-66785.bond
crowsecurity.online
fmi-lostdevice.live
protesisdentalfijaprecio.bond
tcfsi.info
memecoin.vote
walk-in-tubs-65827.bond
linkvin777.top
serenitymassage.top
hostmyworld.net
searchgpt.world
blankmedspa.gallery
mattress-17708.bond
sedanghokiorg.info
funzone365.shop
metacuore.net
coldzero.top
sdcollections.shop
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3456-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3456 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 3456 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96 PID 5068 wrote to memory of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96 PID 5068 wrote to memory of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96 PID 5068 wrote to memory of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96 PID 5068 wrote to memory of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96 PID 5068 wrote to memory of 3456 5068 761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe"C:\Users\Admin\AppData\Local\Temp\761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe"C:\Users\Admin\AppData\Local\Temp\761930655c92d23751075c7399bc4d384270fdeab881a8c486de0362a976b4d0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-