Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 03:13
Static task
static1
Behavioral task
behavioral1
Sample
f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe
Resource
win7-20240903-en
General
-
Target
f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe
-
Size
1.0MB
-
MD5
a44cd4afa52a450fa94c656b8d760339
-
SHA1
09e74273689360524e0afb2f394675d6753867b4
-
SHA256
f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66
-
SHA512
a9e244674485d5d54efd79156c893b375f6a183404225520fb9ac501cd1fd8a99dd6faee6ce777a77996b6106bea91dbba0cc56b7ebf9af9bf8a6f1cb909d833
-
SSDEEP
24576:3AHnh+eWsN3skA4RV1Hom2KXMmHaGNrTAVTZN6EP5:qh+ZkldoPK8YaGx+24
Malware Config
Extracted
formbook
4.1
ma28
orth.monster
5970.pizza
oinayangi.net
usiness-funding-48965.bond
uttere.buzz
raumainformed.xyz
amewith.today
hetangosalon.net
irewoodprice168.shop
commerce-96305.bond
3107.loan
uohan.tech
agakaw.website
fricaduka.store
ecga.info
arehouse-inventory-27582.bond
itchen-design-87997.bond
eishahousesteaksushi.shop
liopew.xyz
4769.pizza
111337tz1.shop
6bwp.info
edlinecolorado.net
trewzxvbnm.online
hemebox.info
ajinismusdoktorankara.online
iralcity.store
aitbus.net
w05.lat
ruck-driver-jobs-16575.bond
nline-advertising-48679.bond
ryptocurrency-22237.bond
epression-test-52238.bond
otellatour.online
leaningsuppliesorganizer.shop
ardinenchante.online
larheit.xyz
elmondo.xyz
xj121529q.vip
nfluencer-marketing-83144.bond
olconsulting.xyz
nah.lat
etking.photos
dadlkj.online
indows-66239.bond
loverhoodie.shop
rkaos.xyz
afikotakediri.store
iaokoa.net
aahoma-alex1.rest
revenzionefiscale.info
itchen-design-56744.bond
ueijodeminasoriginal.shop
reast-cancer-symtoms-loft.world
iddyspiderish.life
execution.pro
vjoami3.xyz
4fe5i.xyz
om-exchange-nft55729.sbs
hgevb.info
isc8ito.xyz
ursuitbegins.forum
louddistribution.net
odgerlazerhats.net
9-club.store
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3152-6-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3152-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4024-14-0x00000000004E0000-0x000000000050F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4560 set thread context of 3152 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 83 PID 3152 set thread context of 3436 3152 svchost.exe 56 PID 4024 set thread context of 3436 4024 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4024 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3152 svchost.exe 3152 svchost.exe 3152 svchost.exe 3152 svchost.exe 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE 4024 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 3152 svchost.exe 3152 svchost.exe 3152 svchost.exe 4024 NETSTAT.EXE 4024 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3152 svchost.exe Token: SeDebugPrivilege 4024 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4560 wrote to memory of 3152 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 83 PID 4560 wrote to memory of 3152 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 83 PID 4560 wrote to memory of 3152 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 83 PID 4560 wrote to memory of 3152 4560 f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe 83 PID 3436 wrote to memory of 4024 3436 Explorer.EXE 84 PID 3436 wrote to memory of 4024 3436 Explorer.EXE 84 PID 3436 wrote to memory of 4024 3436 Explorer.EXE 84 PID 4024 wrote to memory of 2652 4024 NETSTAT.EXE 91 PID 4024 wrote to memory of 2652 4024 NETSTAT.EXE 91 PID 4024 wrote to memory of 2652 4024 NETSTAT.EXE 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe"C:\Users\Admin\AppData\Local\Temp\f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\f43fcf8e27da60e8295eed641aa845de83bb90e8e4e29ad90722e2f72236cb66.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\svchost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-