Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe
Resource
win7-20240903-en
General
-
Target
34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe
-
Size
664KB
-
MD5
d300258dad4f6d26fb8e797865099680
-
SHA1
ace32a1cfea8b72b78e45da6bcb3d8d31c92840e
-
SHA256
34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9
-
SHA512
89da23e88502c23980c8d82c7f2a706744639db8b72fb08e1383064fcf32fd232a3dbd98890c63f6847f1df903859846f637527638b1b563bbc9ca6b96cc2e30
-
SSDEEP
6144:xZbxSy0/npCK4nMRnLAp1xIEqL9vTQfSOJdN4kV7025pqWpSpY5+V/GhjEbx/JVk:LVSy0vp1c1ovv0dT0Bo5+Vuh6JfM
Malware Config
Extracted
formbook
4.1
he2a
070001606.xyz
jesuseascriancas.online
as-eltransport.xyz
bankditalia-company.online
linkedin-stijngraat.online
sportsbetd.xyz
spanish-classes-76893.bond
infonation.pro
nxwzbze.forum
rush-pay.biz
fulfillmissions.lat
infolungcancer.xyz
aqario.xyz
omepro.solar
jackmanmueshl.shop
amcart.store
ishanaudichya.xyz
sun4rk.shop
depression-test-74287.bond
chipit.shop
aulagaminggear.shop
bxc3465.top
credit-rapide-sans-refus.bond
securesavings.ltd
hasanbasriuzun.shop
apolo77meledak.fun
notbokin.online
ethost.biz
cicek-suslemeleri.shop
fashionistahaven.net
opentelemetry.shop
bunny-decor.shop
mersar.fun
send-me-your-feet.pics
intap.shop
supergeoet.best
security-apps-89466.bond
ldentityone.net
b9h.pro
farms-sophon.xyz
shadow-walker.online
jjkdd.vip
yrotf.top
influencer-marketing-47216.bond
dfbfanclub.shop
quarterdeck.cfd
mexico-vacations-packages.today
online-gaming-66785.bond
crowsecurity.online
fmi-lostdevice.live
protesisdentalfijaprecio.bond
tcfsi.info
memecoin.vote
walk-in-tubs-65827.bond
linkvin777.top
serenitymassage.top
hostmyworld.net
searchgpt.world
blankmedspa.gallery
mattress-17708.bond
sedanghokiorg.info
funzone365.shop
metacuore.net
coldzero.top
sdcollections.shop
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1724-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 1724 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89 PID 1456 wrote to memory of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89 PID 1456 wrote to memory of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89 PID 1456 wrote to memory of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89 PID 1456 wrote to memory of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89 PID 1456 wrote to memory of 1724 1456 34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe"C:\Users\Admin\AppData\Local\Temp\34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe"C:\Users\Admin\AppData\Local\Temp\34f07c50351ceb404afb537378b0fd08f7345d378211fcbb5dc51430f5e2cbd9N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-