Analysis
-
max time kernel
41s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe
Resource
win7-20240903-en
General
-
Target
29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe
-
Size
482KB
-
MD5
ba5c17a57a306f0f7233903f847060ba
-
SHA1
452cddab195ea591290d309ff10121715bd7f1f8
-
SHA256
29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86
-
SHA512
e1899d210224e0b9b2217deb99c08eb5a0a850afd5b62f18ec36f15c740bd7a6340ebdae9b751d3acb37671a8a624f65659abe7640fa3ec83779754baf87b870
-
SSDEEP
6144:mhdtBhm+BNEW6Uqd2GhNwv/uCaIhInekTtAnVk3RfMofArTufGjK0Vt:4dPhuzUi2iNwnu6InekGnVk3jITP
Malware Config
Extracted
formbook
4.1
s18y
jokes-online.com
dzzdjn.com
lizzieerhardtebnaryepptts.com
interfacehand.xyz
sale-m.site
block-facebook.com
dicasdamadrinha.com
maythewind.com
hasari.net
omnists.com
thevalley-eg.com
rdfj.xyz
szhfcy.com
alkalineage.club
fdf.xyz
absorplus.com
poldolongo.com
badassshirts.club
ferienwohnungenmv.com
bilboondokoak.com
ambrosiaaudio.com
lifeneurologyclub.com
femboys.world
blehmails.com
gametimebg.com
duytienauto.net
owerful.com
amedicalsupplyco.com
americonnlogistics.com
ateamautoglassga.com
clickstool.com
fzdzcnj.com
txtgo.xyz
izassist.com
3bangzhu.com
myesstyle.com
aek181129aek.xyz
daoxinghumaotest.com
jxdg.xyz
restorationculturecon.com
thenaturalnutrient.com
sportsandgames.info
spiderwebinar.net
erqgseidx.com
donutmastermind.com
aidatislemleri-govtr.com
weetsist.com
sunsetschoolportaits.com
exodusguarant.tech
gsnbls.top
huangdashi33.xyz
amazonretoure.net
greathomeinlakewood.com
lenovoidc.com
qiuhenglawfirm.com
surveyorslimited.com
carterscts.com
helmosy.online
bakersfieldlaughingstock.com
as-payjrku.icu
mr-exclusive.com
givepy.info
ifvita.com
obesocarpinteria.online
agentpathleurre.space
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2684-10-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2684 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31 PID 2504 wrote to memory of 2684 2504 29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe"C:\Users\Admin\AppData\Local\Temp\29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe"C:\Users\Admin\AppData\Local\Temp\29da4b3ce357e683598f545fb5ffd73c198d1a6084642010b4072125cc72cb86.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-