Analysis
-
max time kernel
38s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe
Resource
win7-20240903-en
General
-
Target
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe
-
Size
655KB
-
MD5
b44db06ec43870ea515a278599d36a1e
-
SHA1
00f455fc5f8010b38e47384d9e70d037c780aa98
-
SHA256
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f
-
SHA512
1ae166f1c25564321950ab6ec477b0e147c7c9c4da0ce373e74300d18633fea6a3fb07232a6973432f60acdd53ba18e27572bfa659078379a815f474c9a78644
-
SSDEEP
12288:gTKA5EajbKmxg2vBQHXbIDDzMrWXyZRVHPkNYf4ZAjcGJxaTOdWJIUuxbh:gTKA5EGISQ3b+DzMrXnVPk2f4Ajh3iJa
Malware Config
Extracted
formbook
4.1
h0gd
hispansud.com
sanslisin156.com
izmediajo.com
fukugyo-kuchicomi.net
zjzmkj.net
powerupinnovations.com
unigradecuracao.net
inspirasimagz.com
isaacnqwilliams.store
john316graphics.net
wcparadise.net
trejoblanco.com
100x100cultura.com
beedivinehomedecor.com
polant.xyz
ascrete.com
www23855.com
emmagx.com
rekotalent.biz
fersamultiservicios.com
omaniaa.net
olusiune.xyz
shtycatur.store
private-cars.net
madduxworks.com
edhl-sa.net
vivendodesorteios.online
hec-outfits.com
onlinepoojabooking.com
sofievermeulen.com
recargas-online-virtual.online
all-wedding.com
perfectbikeshort.com
travimall.com
kxctut2.xyz
somaijobs.net
thecyber.academy
official-yukitakaoka.com
winkletest.com
anlegerschutz.review
812664.com
uniqe-base.com
roofingcompanywarren.com
thbzjs.com
tracktelevision.com
rckt-api.com
therealmccoypdfcoffee.com
dalehollowoutdoors.com
childcaregameplan.com
starbonus7.com
mturko.com
genelyn.net
swapit.press
bathroomremodelingtips.net
v60010.xyz
propertyprotect.net
dealipal.com
savefrsaom.net
sepela-food.com
thepetvetlife.com
el-balcon.com
frenda.online
sutefisufeles.xyz
trillumtrillum.com
x-surcinetenerife.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1896-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exedescription pid process target process PID 2440 set thread context of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2948 1896 WerFault.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exedescription pid process target process PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 2440 wrote to memory of 1896 2440 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe PID 1896 wrote to memory of 2948 1896 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe WerFault.exe PID 1896 wrote to memory of 2948 1896 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe WerFault.exe PID 1896 wrote to memory of 2948 1896 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe WerFault.exe PID 1896 wrote to memory of 2948 1896 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 363⤵
- Program crash
PID:2948
-
-