Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe
Resource
win7-20240903-en
General
-
Target
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe
-
Size
483KB
-
MD5
ae452c2e1a3b7aceebfe0349e58239b8
-
SHA1
ef38728e61d5abc32cae40d326577432aa7fa9ac
-
SHA256
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78
-
SHA512
b82a7455c26d3fd6b61ce89a21945edbe278dc431667bb8c766ba9ee5af10f2bf538bc7ee29055994360b63986686f56dc16e6197d872c225fd36dcf179de8af
-
SSDEEP
6144:fYG1f456Uqd2GhNAqwisAnIikwTc0gIlokyp3I5a5Kx81wHadqMWp/19SORtx:QhAUi2iNA1AIikNqp15anwHadZWTLd
Malware Config
Extracted
formbook
4.1
jy0b
lamejorimagen.com
mykabukibrush.com
modgon.com
barefoottherapeutics.com
shimpeg.net
trade-sniper.com
chiangkhancityhotel.com
joblessmoni.club
stespritsubways.com
chico-group.com
nni8.xyz
searchtypically.online
jobsyork.com
bestsales-crypto.com
iqmarketing.info
bullcityphotobooths.com
fwssc.icu
1oc87s.icu
usdiesel.xyz
secrets2optimumnutrition.com
charlotte-s-creations.com
homenetmidrand.com
sytypij.xyz
tapehitsscriptsparty.com
adelenashville.com
greendylife.com
agbqs.com
lilcrox.xyz
thepersonalevolutionmaven.com
graciasmiangel.com
heidisgifts.com
flchimneyspecialists.com
yorkrehabclinic.com
cent-pour-centsons.com
marcoislandsupsurf.net
expressdiagnostics.info
surferjackproductions.com
duscopy.store
uekra.tech
campaigncupgunplant.xyz
cheetahadvance.com
blickosinski.icu
laketacostahoe.com
drippysupplyco.com
isomassagegun.com
clarition.com
andrew-pillar.com
truthbudgeting.com
cloudfixr.com
cfasministries.com
compliant-now-beta.com
kssc17.icu
plewabuilders.com
uslugi-email.site
167hours.com
sodo6697.com
voyagesify.com
ranodalei.com
culturao.com
littlepotato-id.com
integtiryhvacsanmateo.com
neatmounts.com
reddictnflstream.com
digistore-maya.com
filecrev.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2832-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription pid process target process PID 2512 set thread context of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exepid process 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 2832 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 2832 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription pid process Token: SeDebugPrivilege 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exedescription pid process target process PID 2512 wrote to memory of 1084 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 1084 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 1084 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe PID 2512 wrote to memory of 2832 2512 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe 667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"2⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"C:\Users\Admin\AppData\Local\Temp\667cb593ef99fba15e74b9eff4384e0590435e01d9914c7b500064133ece2e78.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-