Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe
Resource
win7-20240903-en
General
-
Target
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe
-
Size
483KB
-
MD5
ae452c2e1a3b7aceebfe0349e58239b8
-
SHA1
ef38728e61d5abc32cae40d326577432aa7fa9ac
-
SHA256
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78
-
SHA512
b82a7455c26d3fd6b61ce89a21945edbe278dc431667bb8c766ba9ee5af10f2bf538bc7ee29055994360b63986686f56dc16e6197d872c225fd36dcf179de8af
-
SSDEEP
6144:fYG1f456Uqd2GhNAqwisAnIikwTc0gIlokyp3I5a5Kx81wHadqMWp/19SORtx:QhAUi2iNA1AIikNqp15anwHadZWTLd
Malware Config
Extracted
formbook
4.1
jy0b
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
filecrev.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2460-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription pid Process procid_target PID 2920 set thread context of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2536 2460 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exepid Process 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription pid Process Token: SeDebugPrivilege 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription pid Process procid_target PID 2920 wrote to memory of 2712 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 30 PID 2920 wrote to memory of 2712 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 30 PID 2920 wrote to memory of 2712 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 30 PID 2920 wrote to memory of 2712 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 30 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2920 wrote to memory of 2460 2920 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 31 PID 2460 wrote to memory of 2536 2460 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 32 PID 2460 wrote to memory of 2536 2460 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 32 PID 2460 wrote to memory of 2536 2460 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 32 PID 2460 wrote to memory of 2536 2460 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"2⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 363⤵
- Program crash
PID:2536
-
-