Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe
Resource
win7-20240903-en
General
-
Target
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe
-
Size
655KB
-
MD5
b44db06ec43870ea515a278599d36a1e
-
SHA1
00f455fc5f8010b38e47384d9e70d037c780aa98
-
SHA256
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f
-
SHA512
1ae166f1c25564321950ab6ec477b0e147c7c9c4da0ce373e74300d18633fea6a3fb07232a6973432f60acdd53ba18e27572bfa659078379a815f474c9a78644
-
SSDEEP
12288:gTKA5EajbKmxg2vBQHXbIDDzMrWXyZRVHPkNYf4ZAjcGJxaTOdWJIUuxbh:gTKA5EGISQ3b+DzMrXnVPk2f4Ajh3iJa
Malware Config
Extracted
formbook
4.1
h0gd
hispansud.com
sanslisin156.com
izmediajo.com
fukugyo-kuchicomi.net
zjzmkj.net
powerupinnovations.com
unigradecuracao.net
inspirasimagz.com
isaacnqwilliams.store
john316graphics.net
wcparadise.net
trejoblanco.com
100x100cultura.com
beedivinehomedecor.com
polant.xyz
ascrete.com
www23855.com
emmagx.com
rekotalent.biz
fersamultiservicios.com
omaniaa.net
olusiune.xyz
shtycatur.store
private-cars.net
madduxworks.com
edhl-sa.net
vivendodesorteios.online
hec-outfits.com
onlinepoojabooking.com
sofievermeulen.com
recargas-online-virtual.online
all-wedding.com
perfectbikeshort.com
travimall.com
kxctut2.xyz
somaijobs.net
thecyber.academy
official-yukitakaoka.com
winkletest.com
anlegerschutz.review
812664.com
uniqe-base.com
roofingcompanywarren.com
thbzjs.com
tracktelevision.com
rckt-api.com
therealmccoypdfcoffee.com
dalehollowoutdoors.com
childcaregameplan.com
starbonus7.com
mturko.com
genelyn.net
swapit.press
bathroomremodelingtips.net
v60010.xyz
propertyprotect.net
dealipal.com
savefrsaom.net
sepela-food.com
thepetvetlife.com
el-balcon.com
frenda.online
sutefisufeles.xyz
trillumtrillum.com
x-surcinetenerife.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2804-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2804-12-0x0000000000A00000-0x0000000000D03000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exedescription pid Process procid_target PID 2828 set thread context of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exepid Process 2804 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exedescription pid Process procid_target PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30 PID 2828 wrote to memory of 2804 2828 6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"C:\Users\Admin\AppData\Local\Temp\6be70aa8b9e4772894bb7a4e03551de79d442a0263d8b327eb8c22d00f2b3e9f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-