Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe
Resource
win7-20240903-en
General
-
Target
Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe
-
Size
1.4MB
-
MD5
6de30093ba5663d3446d5fa60d4b229c
-
SHA1
6a2c90171b273c0123aba4a8a0a89506ae05c2bb
-
SHA256
e790e710f5020d3450504e9dd7001c5279ef5d9b01dd133783542ad184771517
-
SHA512
342c678c3b335b0e4ece024195a555fc4e570d7d50f367af331ab76ef913584460239e25825170db670ad116319eb6852c93014ed5efb643e05ce7c40ca4f6da
-
SSDEEP
24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8amfdOEsqRONlanXbINp:TTvC/MTQYxsWR7amfvROan
Malware Config
Extracted
formbook
4.1
ud04
oum7.pro
ovonordisk.online
akrzus.pro
tendmtedcpsa.site
mm.foo
animevyhgsft29817.click
digdxxb.info
1130.vip
uy-now-pay-later-74776.bond
ybzert.online
edcn.link
rime-flow-bay.xyz
nd777id.beauty
otoyama.shop
lranchomx.xyz
unluoren.top
uglesang-troms.net
udulbet88.net
raquewear.shop
ijanarko.net
iuxy.host
itaxia.dev
hisewntbqg.makeup
talianfood.store
22gxx.app
tandkite.fun
rovideoeditor.shop
ires-86307.bond
elitjatarjoukset.click
rofilern.net
uycarpaylater-02-t1e-01.today
futurum.xyz
inance15.site
alance-ton-budget.net
tpuniplay.shop
dlpli.xyz
riteon.online
rippyshaker.shop
rn10.top
linko1win.icu
ugeniolopez.art
raphic-design-degree-68380.bond
narchists.info
uy-now-pay-later-25573.bond
gzvmt.info
df.clinic
onesome.store
imba-168.net
ayef.xyz
64axyozkgl.top
dult-diapers-53774.bond
ec.baby
el-radu-easy4y.one
asik-eye-surgery-63293.bond
p-inbox4.click
0417.one
ualitystore.shop
partments-for-rent-61932.bond
enobscotlobster.online
fhou.link
eo56a3oouu.top
cweb.cyou
hoe-organizer-za.today
p806.top
2creativedesign.online
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2792-3-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exedescription pid Process procid_target PID 2124 set thread context of 2792 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exepid Process 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exedescription pid Process procid_target PID 2124 wrote to memory of 2792 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe 30 PID 2124 wrote to memory of 2792 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe 30 PID 2124 wrote to memory of 2792 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe 30 PID 2124 wrote to memory of 2792 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe 30 PID 2124 wrote to memory of 2792 2124 Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Kópia Žiadosti o platbu faktúry 0010 (2).xlsx.exe"2⤵PID:2792
-