Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 01:51
Static task
static1
Behavioral task
behavioral1
Sample
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe
Resource
win7-20240903-en
General
-
Target
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe
-
Size
707KB
-
MD5
059cd028f0855871593e963697a27783
-
SHA1
7f7cc06bc0e50e62b08f05e73766d16cc8ce6996
-
SHA256
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee
-
SHA512
0ac33853bc0bab21c54fb9180c0e0ef0fbabb6db0bbe19b286667f93ba03f2a4e2ef9ca524c33da2fd9995ef1ea69ffff93e423abd340a69df59ac2a4d9417b3
-
SSDEEP
12288:FPIbw8eG5KB21407XO6mfhk3EfJbFZEHkRO6i8kzXqJFTPXWBJG5vaQAyP:qbw8eG56214WYHEHY18zXqToS
Malware Config
Extracted
formbook
4.1
mo9n
circuit-town.com
stock-high.xyz
barlindelivery.com
littletoucans.com
bright-tailor.com
firsthandcares.com
ecompropeller.com
circuitoalberghiero.net
creative-egyptps.com
bitracks56.com
douhonghong.com
fingertipcollection.com
happy-bihada.space
blockchainairdropreward.com
xn--reljame-jwa.com
polloycarnesdelivery.com
d22.group
eslamshahrservice.com
vanzing.com
juzide.com
g5795ky.com
ufound1.com
cifbit.com
shawtopia.com
tourmethere.com
heritagepedia.com
832391.com
voltera.solar
greatergods.com
shchengtang.com
oyakudachibiz.com
kentislandeats.com
quietaou.com
infinitephoenix.club
tmrtg.com
menes.digital
sefappliancerepair.com
tnghana.com
tanyan.xyz
findyourtrailhead.com
labizandbryan.com
agnesdesigner.net
lebai100.com
lz-fcaini1718-hw0917-bs.xyz
nucleustudio.com
smartsparklegal.com
streets4suites.com
neo-graphite.com
maquinariaarenastlaxmexcom.com
svartmancoaching.com
icarus-groupe.com
media777.club
juicyyjuicebox.com
sakinawlake.properties
escrubpro.com
onlinecasino-tengoku.com
ganymede.sbs
sunshineprofitness.com
solideo.place
septemberstockevent100.com
tjginde.com
shopamwplanner.com
ee7r.com
sootherelaxandheal.com
lievival.info
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4616-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exedescription pid process target process PID 640 set thread context of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exepid process 4616 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 4616 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exedescription pid process target process PID 640 wrote to memory of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe PID 640 wrote to memory of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe PID 640 wrote to memory of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe PID 640 wrote to memory of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe PID 640 wrote to memory of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe PID 640 wrote to memory of 4616 640 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe 5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe"C:\Users\Admin\AppData\Local\Temp\5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\5cc57d4f96ab5a09197abb5d73e10104e0343cabbe3073ed640299b6b9c7e6ee.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-