Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe
Resource
win7-20240903-en
General
-
Target
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe
-
Size
822KB
-
MD5
f1217c3aad742f6f0aed2d6cae0feae6
-
SHA1
ec8c8d19b72ce379bba42d52edb0639c2564ee2c
-
SHA256
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182
-
SHA512
996b86f071a023e4f6ec6f0a0eee9d375a0fe36550615647ccf411dc1bbb4a715df4a53ced2f49d61b4ec4196a16b0f3977ea7bb18d795145b774be5a73fb49d
-
SSDEEP
12288:cbXj9L5sl1ApYy42fxWfWgYv7im/Qw9ELyX56CqFNpgNefKitTra:kL5sl1ApXhfQfivGAQDu56CqF3gNeCU
Malware Config
Extracted
formbook
4.1
btrd
toulouse.gold
launchyouglobal.com
margarita-services.com
dasnail.club
casa-hilo.com
hardscapesofflorida.com
thepositivitypulse.com
kkmyanev.cfd
love6ace22.top
castorcruise.com
chch6.com
h59f07jy.cfd
saatvikteerthyatra.com
fxsecuretrading-option.com
mostbet-k1o.click
36-m.beauty
ko-or-a-news.com
eurekatextile.com
gynlkj.com
deepsouthcraftsman.com
bougiebossbabe.com
202402.xyz
thecareskin.com
zimmerli.online
bathroomconnectsupreme.com
opmk.monster
docemimocasamentos.com
mywayinist.com
healthyters.com
mozartchamberorchestra.sydney
wewillrock.club
education2jobs.com
everlastdisposal.com
valentinascrochet.com
stewartvaluation.net
blackphoenix01.xyz
omnikart.shop
jejeesclothing.com
allurepet.site
futureofaustin.com
sillylittlestory.com
inthewoodsdesigns.com
freshtraining.store
illuminati4me.com
jewishlakecounty.com
devadecoration.com
nashexshop.com
martline.website
affirmationtotebags.com
golifestyles.com
telegood.info
trygenesisx.com
bestwhitetee.com
delicatemayhem.com
redyardcom.com
solarcyborg.com
emotieloos.com
fanatics-international.com
ballonsmagiques.com
projektincognito.com
fcno30.com
horizonoutdoorservices.com
couturewrap.com
mbbwa4wp.cfd
lifeofthobes.uk
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4888-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4888-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/1820-24-0x0000000000570000-0x000000000059F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeAddInProcess32.exeNETSTAT.EXEdescription pid Process procid_target PID 3692 set thread context of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 4888 set thread context of 3512 4888 AddInProcess32.exe 56 PID 1820 set thread context of 3512 1820 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeNETSTAT.EXEcmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid Process 1820 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeAddInProcess32.exeNETSTAT.EXEpid Process 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 4888 AddInProcess32.exe 4888 AddInProcess32.exe 4888 AddInProcess32.exe 4888 AddInProcess32.exe 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE 1820 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
AddInProcess32.exeNETSTAT.EXEpid Process 4888 AddInProcess32.exe 4888 AddInProcess32.exe 4888 AddInProcess32.exe 1820 NETSTAT.EXE 1820 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeAddInProcess32.exeNETSTAT.EXEdescription pid Process Token: SeDebugPrivilege 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe Token: SeDebugPrivilege 4888 AddInProcess32.exe Token: SeDebugPrivilege 1820 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exeExplorer.EXENETSTAT.EXEdescription pid Process procid_target PID 3692 wrote to memory of 1460 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 83 PID 3692 wrote to memory of 1460 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 83 PID 3692 wrote to memory of 1460 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 83 PID 3692 wrote to memory of 1460 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 83 PID 3692 wrote to memory of 1460 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 83 PID 3692 wrote to memory of 1460 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 83 PID 3692 wrote to memory of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 3692 wrote to memory of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 3692 wrote to memory of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 3692 wrote to memory of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 3692 wrote to memory of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 3692 wrote to memory of 4888 3692 dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe 91 PID 3512 wrote to memory of 1820 3512 Explorer.EXE 101 PID 3512 wrote to memory of 1820 3512 Explorer.EXE 101 PID 3512 wrote to memory of 1820 3512 Explorer.EXE 101 PID 1820 wrote to memory of 3200 1820 NETSTAT.EXE 102 PID 1820 wrote to memory of 3200 1820 NETSTAT.EXE 102 PID 1820 wrote to memory of 3200 1820 NETSTAT.EXE 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe"C:\Users\Admin\AppData\Local\Temp\dbd0f766892484935d48872b872d39fe1ddfa273b3efff8ce05ab2381a383182.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:1460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-