Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe
Resource
win7-20240708-en
General
-
Target
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe
-
Size
675KB
-
MD5
3ae40912766339837da60e6a29e72791
-
SHA1
f7a3e4560435770745d04a9abf5ae4b88b29f2a9
-
SHA256
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d
-
SHA512
88446cbf3de77af430bdd18c0d7932789fbe626b236b318701b3e6b1d362d8ac4f6166c84cc254594efa0be9307af4f11bcb3dcee8792e499239e39ad745ec41
-
SSDEEP
12288:4nCb+eCSmzZmUpNPGNOCQmO51NvC+lyh8A7/tbRTzJc:4uCBMwhGNxi9l4/Tz
Malware Config
Extracted
formbook
4.1
g92s
utomation-tools-55205.bond
commerce-99094.bond
ufounoufeng.vip
arkknighttransport.net
et9ja.webcam
75511.vip
afiabmfkrk.online
lluminos.live
egitfxtrade.live
zn-lab.net
implifiedprojects.net
mjsnnn5716.shop
ecurity-service-28490.bond
andy888th.online
dno.xyz
ofl.xyz
enamind.net
ellnessdigitalmedia.store
mcreative.studio
wctoken-v2.icu
ochnonevpn.online
amewith.auction
groupsrl.net
piro.style
hdqyp.shop
76v.lat
dzywkanaporostrzes.pro
nitypath.website
slami.store
erseus-global.net
52pq293kt.skin
duxrib.xyz
utosub.xyz
otorcycle-loans-21363.bond
acho.store
lay44.bet
olka.xyz
eelthevibe.xyz
reezedrybreastmilk.net
ythicsportswear.online
tatspw.online
x-design-courses-91526.bond
inhngoc.photos
kuxepe.info
rjeffbarry.online
unnylogistics.pro
eaponreadiness.net
69nyccoffee.shop
atiao.asia
eekend-warriors.website
umematch.net
arrefour-banque.business
ehuatang.online
hhls370824.sbs
manate.ltd
oodstocks.sbs
essicafilho.online
nline-mba-94006.bond
hreekalyanam.online
nline-advertising-57293.bond
nline-advertising-77795.bond
otorcycle-loans-81246.bond
olar-battery-13607.bond
nfluencer-marketing-27273.bond
igitalsells-corner.xyz
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1456-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exedescription pid Process procid_target PID 1864 set thread context of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exea31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exepid Process 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 1456 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exedescription pid Process Token: SeDebugPrivilege 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exedescription pid Process procid_target PID 1864 wrote to memory of 2000 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 31 PID 1864 wrote to memory of 2000 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 31 PID 1864 wrote to memory of 2000 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 31 PID 1864 wrote to memory of 2000 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 31 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32 PID 1864 wrote to memory of 1456 1864 a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe"C:\Users\Admin\AppData\Local\Temp\a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe"C:\Users\Admin\AppData\Local\Temp\a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe"2⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe"C:\Users\Admin\AppData\Local\Temp\a31bb86950434c10901f781ec299b84323cd6c199b557f39653cdc5557641b6d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-