Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe
Resource
win7-20240903-en
General
-
Target
732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe
-
Size
587KB
-
MD5
c6b38036b68ea21306e8814ab1b1b4d9
-
SHA1
6b1ee982b77f2274ff6844f06706f13418dc6aa0
-
SHA256
732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693
-
SHA512
ffe83694f14e956fcd63e0f83845a1d631da501cfbf3552f0bc043d228b3fe59465a6c30bfd5c4bb98faaa89d00ecc4bf5881734a9d26d40759f7ce45eeee833
-
SSDEEP
12288:b5WqpMT1dGUsVYQP3OT0UuA/4jj2m5tpyoBfVN07dq9ovF6sDYSuk7xLZXo:bw0c1dGUsVYQ6uO/mbhVKqqYVk7xdo
Malware Config
Extracted
formbook
4.1
c89p
ftersaleb.top
dcustomdesgins.net
ostbet2024.live
rhgtrdjdjytkyhretrdjfytd.buzz
atauniversity.tech
idoctor365.net
x-design-courses-29670.bond
ellowold-pc.top
ransportationmmsytpro.top
areerfest.xyz
artiresbah-in.today
ijie.pro
torehousestudio.info
69-11-luxury-watches.shop
earing-tests-44243.bond
hits.shop
hzl9.bond
lood-test-jp-1.bond
livialiving.online
usymomsmakingmoney.online
olar-systems-panels-61747.bond
hinawinner.top
oldensky10.xyz
oginsuperking777.click
oviepicker.net
partment-rental05.online
ldkp.net
sofaerb.shop
ydh5.beauty
aston-saaaa.buzz
acuum-cleaner-84018.bond
usiness-printer-37559.bond
dindadisini12.click
j7zd12m.xyz
plesacv.xyz
trustcapital247.online
asapembuatanpatung.online
ent-all.xyz
r64mh1.vip
aser-cap-hair-growth.today
amattva.company
herightfits.top
uickautoquote.net
ctu36ojboz6w2cl.asia
oursmile.vip
astysavor.website
iam-saaab.buzz
igmoto.info
itchellcohen.net
un-sea.fun
steticavonixx.shop
arklife.shop
bsboffchatrussummsa.online
iuxing.asia
okenexchange.art
llhealthreview.online
refabricated-homes-53685.bond
atercraze.net
osmits.net
rail.cruises
utanginamo.sbs
hapanda.fun
arehouse-inventory-29693.bond
innivip.bio
aycare-service-99683.bond
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4760-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4572 set thread context of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4760 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 4760 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88 PID 4572 wrote to memory of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88 PID 4572 wrote to memory of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88 PID 4572 wrote to memory of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88 PID 4572 wrote to memory of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88 PID 4572 wrote to memory of 4760 4572 732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe"C:\Users\Admin\AppData\Local\Temp\732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe"C:\Users\Admin\AppData\Local\Temp\732336eccda1e0e01a9474a968eb6ac9725fec8e8e03ad950472df75ba470693.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-