Analysis
-
max time kernel
94s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe
Resource
win7-20240704-en
General
-
Target
0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe
-
Size
757KB
-
MD5
64cd9cd8d129491524b6277481bab740
-
SHA1
296115935b522a4db4ecfb523c44eb8ef94b2f18
-
SHA256
0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8
-
SHA512
d6b54b504d8cbf3b82bb36eaf726637f6c0a37f2709d54a3a978d4cb52545fb95bc4a684d63c1f6ac93b3ae152b978ebe3479c5322e1dbc3f3e956bc9530016a
-
SSDEEP
12288:fUxdjs00ib3ioqc9+xTe0PR6m0eFy2ktn3IjLJJpN+xKPf1rPnx:Sdj0ibSoq8+xbZT0i2gVJ2M3px
Malware Config
Extracted
formbook
4.1
grve
jrvinganimalexterminator.com
smallsyalls.com
po1c3.com
mencg.com
aussieenjoyment.today
espace22.com
aanmelding-desk.info
gallopshoes.com
nftsexy.com
ricosdulcesmexicanos.com
riseswift.com
thechicthirty.com
matdcg.com
alternet.today
creativehuesdesigns.com
rjkcrafts.com
lowdosemortgage.com
adoptahamster.com
wellness-sense.com
jacardcapital.com
pastiindonesia.com
lindsaynathan2021.com
brisbanemagicians.com
tvglanz.com
388384.com
mitgrim.com
endonelatrading.com
political.singles
ganjegirls.com
democratscancelled.com
ytzhubao.com
roiskylands.com
zamlgroup.com
winstonsalemathleticclub.com
62qtz2.com
caddyys.com
ecorarte.com
coonier.com
cbgmanhattan-hub.com
givanon.com
tioniis11.com
variceselite.com
tasaciona.com
hiphopeconomicdevelopment.com
citrixfile.com
piebuilder.com
drmetalpublishing.com
themesthatyoulike.com
vinhomes-phamhung.info
ardecentro.com
gameshowsatwork.com
go-rillathebrand.com
virtualppo.com
nogodbeforeme.net
fabrezeairpurifiers.com
roorisor.com
elaraberentcar.com
rugpat.com
renewalbyheather.com
innocox.com
ztsj10086.com
channelarmor.info
thecarbonbox.store
edicionesvita.com
yjhlgg.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4892-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3776 set thread context of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4892 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 4892 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94 PID 3776 wrote to memory of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94 PID 3776 wrote to memory of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94 PID 3776 wrote to memory of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94 PID 3776 wrote to memory of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94 PID 3776 wrote to memory of 4892 3776 0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe"C:\Users\Admin\AppData\Local\Temp\0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe"C:\Users\Admin\AppData\Local\Temp\0c46fc62123c9418ecaf8f16a87b595a93c92e3c9a4323ddadcdce09b5412bd8N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-