Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe
Resource
win7-20241010-en
General
-
Target
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe
-
Size
688KB
-
MD5
f9ab9af186e3f93e2151f5a579a87ed5
-
SHA1
0295a08decc7447e11d0a72aa139fe5564fedcaf
-
SHA256
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639
-
SHA512
eeaaca6d9ff2be7f8ad961ac36b67afa651e9ab1ddea5679276f7383ebf72ee8b799cf1300199d49c6da01b023a786ed7685d57757a8d9e25fea01c759a50dbb
-
SSDEEP
12288:yrON+Ri3AgFdAirPuV7lXmkEFRtPWENotTyOxsuY+VE6/D+/HBzJ96Q:6Q3AggbmVFRt+uotTr8YLozqQ
Malware Config
Extracted
formbook
4.1
q06e
iibutogel88.life
atumainitx.net
axto1xb.top
iberalparti.xyz
etfury.shop
ainter-job-14480.bond
rhyd82593.vip
yexoiup.xyz
ityreel.page
usiness-ddljxgk.top
eifeigou.top
asl321.dev
eativ.cloud
ollywoodbets.fan
azekage.shop
ojarski.online
ardtaste.net
ltair-bots.online
atncs.top
k8y.info
bookauto.site
reencollectiongrup.online
3001.vip
alancednourish.shop
aliente.furniture
elationship-coach-50004.bond
doglesa.homes
afatogela.live
uu98.top
eal-estate-55232.bond
dtrear.net
588535.vip
b53ojq9.top
efurbico.online
ersawgero.online
mica.store
andor.site
arehouse-inventory-59535.bond
ajaslot88.store
lariphi.app
bookbusiness.shop
mvip7.xyz
foye8.buzz
g8.today
lockchain-life.forum
kyboost.digital
wyza32084.vip
wander.shop
dyd.top
icitaenlinea.digital
ockmybrand.shop
extlan.net
ouches-sofas-93874.bond
hinz.net
sphome.pro
racimp.bond
orus.wiki
all-center-88424.bond
tjia.info
iqnli.top
slpo.link
192222-com00.top
fricanti.online
unce.top
tacr.click
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3420-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exedescription pid Process procid_target PID 1912 set thread context of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exebfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exepid Process 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 3420 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 3420 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exedescription pid Process Token: SeDebugPrivilege 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exedescription pid Process procid_target PID 1912 wrote to memory of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99 PID 1912 wrote to memory of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99 PID 1912 wrote to memory of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99 PID 1912 wrote to memory of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99 PID 1912 wrote to memory of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99 PID 1912 wrote to memory of 3420 1912 bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe"C:\Users\Admin\AppData\Local\Temp\bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe"C:\Users\Admin\AppData\Local\Temp\bfb7388e3606586ff37b33b4a2ddc231b010c60bc4b1907780c7582939f84639.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-