Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe
Resource
win7-20240903-en
General
-
Target
06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe
-
Size
674KB
-
MD5
dad35c7d363f5ebf873d3e8927b3d3bb
-
SHA1
b7f3d564a9e59d8cf0e128d9b061de9609acabef
-
SHA256
06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd
-
SHA512
dbb1dc9d04911786be32a7e773304f7aaa45672a99f866752890bdd22304f688ed95ea625c61b25901dfd23518d0ea4e90badf2b169b415ad94467532eb0a248
-
SSDEEP
12288:XiKBMaCaRD7Sh0TPo7Eyv2qbEky9/FrveiOMGUSl8UKThcWj5OzRBaGpIpD:JManRW0Tg7EyNbx6EqGGUw+Igb
Malware Config
Extracted
formbook
4.1
c89p
ftersaleb.top
dcustomdesgins.net
ostbet2024.live
rhgtrdjdjytkyhretrdjfytd.buzz
atauniversity.tech
idoctor365.net
x-design-courses-29670.bond
ellowold-pc.top
ransportationmmsytpro.top
areerfest.xyz
artiresbah-in.today
ijie.pro
torehousestudio.info
69-11-luxury-watches.shop
earing-tests-44243.bond
hits.shop
hzl9.bond
lood-test-jp-1.bond
livialiving.online
usymomsmakingmoney.online
olar-systems-panels-61747.bond
hinawinner.top
oldensky10.xyz
oginsuperking777.click
oviepicker.net
partment-rental05.online
ldkp.net
sofaerb.shop
ydh5.beauty
aston-saaaa.buzz
acuum-cleaner-84018.bond
usiness-printer-37559.bond
dindadisini12.click
j7zd12m.xyz
plesacv.xyz
trustcapital247.online
asapembuatanpatung.online
ent-all.xyz
r64mh1.vip
aser-cap-hair-growth.today
amattva.company
herightfits.top
uickautoquote.net
ctu36ojboz6w2cl.asia
oursmile.vip
astysavor.website
iam-saaab.buzz
igmoto.info
itchellcohen.net
un-sea.fun
steticavonixx.shop
arklife.shop
bsboffchatrussummsa.online
iuxing.asia
okenexchange.art
llhealthreview.online
refabricated-homes-53685.bond
atercraze.net
osmits.net
rail.cruises
utanginamo.sbs
hapanda.fun
arehouse-inventory-29693.bond
innivip.bio
aycare-service-99683.bond
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1248-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1248-16-0x0000000000AC0000-0x0000000000DC3000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1248 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31 PID 540 wrote to memory of 1248 540 06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe"C:\Users\Admin\AppData\Local\Temp\06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe"C:\Users\Admin\AppData\Local\Temp\06d709cf438f3fefe0ed7858278e77e1188422e2b4d59706f6c4759df1a5aafd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-