Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe
Resource
win7-20240903-en
General
-
Target
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe
-
Size
569KB
-
MD5
d564817bb785c9b4679b720f44372b78
-
SHA1
a5ad3a1a6213ec64d6047d2d28b569d6a3c8b2b3
-
SHA256
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99
-
SHA512
4d47376a1aecbd20a5bb97a04e9486f61e4cbcf627e882dbd26890ebc92b2d042e31f3fcc70d294cadf05a0388538dc9a84d6edf243a53625241891e1b1e1bd3
-
SSDEEP
12288:46J/ZsDPDXWsjZ4s2JQUCM2SuGNmYSTeqf:46pZs7DmsispUCM9V9CeW
Malware Config
Extracted
formbook
4.1
d7ln
bulut-imza.com
gotastebuds.com
shutupmags.com
clocksport.com
toweryachtcounsel.com
kingcopier.com
pluspersona.com
inchallahe.com
unclonedconsulting.com
ccdt168.com
tonyzheng.xyz
voiceoftheepeople.com
cicapital.xyz
offxpro.com
loyatiproductions.com
makemebuystuff.com
incuba8labs.com
remparka.com
newstft.com
bgame.pro
croniesnft.xyz
petaouchnock.site
gavesett.com
smarthousegroup.net
kkqdqj.mobi
glatdelate.quest
sharpmage.com
penis.today
squidscatter.com
digfinancial.com
imx.fund
bigbet3269.com
leatherlidinserts.net
eyecollection-nishigifu.com
wagyuchefs.com
cafeandbakecestbon.com
appsy.tech
johnmaxwelltam.com
eternity-warm.com
naebidynamic.com
landgrunt.com
chap-immo.com
wgzywz.com
zawovu.com
shortsvault.com
squidgameoutfitsss.com
keaneoil.com
v44881.com
spartanboardgames.com
rotcid.xyz
qvconsultants.com
reinorshine.com
turkeyetrade.com
webcomprei.com
00010shou.com
tiffanyandjose.com
todd4mayor.com
designbydb.com
higherj.com
delicatmnl.com
huamanishop.com
pinkle-store.com
gatewaytothegreatoceanroad.com
felerritst.quest
mottpolis.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1452-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exedescription pid Process procid_target PID 4760 set thread context of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exepid Process 1452 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 1452 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exedescription pid Process procid_target PID 4760 wrote to memory of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91 PID 4760 wrote to memory of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91 PID 4760 wrote to memory of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91 PID 4760 wrote to memory of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91 PID 4760 wrote to memory of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91 PID 4760 wrote to memory of 1452 4760 851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe"C:\Users\Admin\AppData\Local\Temp\851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe"C:\Users\Admin\AppData\Local\Temp\851eca040f78d215df7b272da1af4a5438c94fc5e9c7685db00ef25f2954bb99.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-