Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe
Resource
win7-20240729-en
General
-
Target
ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe
-
Size
550KB
-
MD5
cb0b9fd1fdae008c92228b57f6c50a90
-
SHA1
567cf2c5994f1485dc9d8808156fae39647649f0
-
SHA256
ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917
-
SHA512
9585d5b2d9bb93d575facebd97b05818a14ba02c984158a80322c7e494ffaf6e559155b48e0ddb363c1cc5a99c85ae7c92f5ef77df93be046d65278de7d25726
-
SSDEEP
12288:5MUgm/3dE/fGiCNGiTVTsdrE0V92fO/lk9onzNXxn2iv+:5M2//iCRSdrZV92f79onzNXEiv+
Malware Config
Extracted
formbook
4.1
giok
royaltysplit.xyz
home-remodeling-32327.bond
ocosoap.download
mx51pbk5z3.top
sapidermen154.buzz
always23082025.info
jencodiahcp.net
psychologist-therapy-13104.bond
okigoods.online
posedon.online
ryclegalpartners.info
seek-zapatosenlinea-cl.info
xataa.info
vitalityyvault.online
hallice732.xyz
snspleak.info
ilbrentdigitalx.info
breast-implants-17988.bond
subedisaurav.site
instamoney.website
1ckme.rest
academiastillus.net
solclaim.top
r51jq644rz.rent
pilates.media
1155.site
business-software-13225.bond
packing-jobs-78839.bond
ampbtj.site
alemdobasicomodas.store
blinkyo.pro
boostmytft.shop
tania168.net
brainyquestcraft.bond
cricadium.info
mainnyalabet.store
gymloyal.shop
cjkz9kanfj2.top
nordiccarry.shop
adjustable-bed-78983.bond
vibrantsoul.xyz
altamodapasto.com
ali-atamimi.com
christianmingles.world
clearose.online
beverlyportapottyrental.com
torchhumanx.website
deityclothing.store
bathroom-remodeling-87847.bond
dotbigsignal.info
discountsforseniors.bond
credit-card20.today
open-source-software-93160.bond
betterconsultoria.net
alphalogic.xyz
fantasitogel.xyz
laoruby.net
aci.army
smartworkssolutions.net
rhinoplasty-surgery-734325.bond
23490.net
tryzapguardian.shop
dentist-for-seniors-81556.bond
susanrudd.online
gzs15.top
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4240-4-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4440 set thread context of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 4240 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4880 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 83 PID 4440 wrote to memory of 4880 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 83 PID 4440 wrote to memory of 4880 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 83 PID 4440 wrote to memory of 4880 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 83 PID 4440 wrote to memory of 876 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 84 PID 4440 wrote to memory of 876 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 84 PID 4440 wrote to memory of 876 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 84 PID 4440 wrote to memory of 876 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 84 PID 4440 wrote to memory of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 PID 4440 wrote to memory of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 PID 4440 wrote to memory of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 PID 4440 wrote to memory of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 PID 4440 wrote to memory of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 PID 4440 wrote to memory of 4240 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 85 PID 4440 wrote to memory of 2216 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 86 PID 4440 wrote to memory of 2216 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 86 PID 4440 wrote to memory of 2216 4440 ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe"C:\Users\Admin\AppData\Local\Temp\ae2734cb4074c909b5d1469c4901bfc03487342723505ef4c1adcb41d64e3917N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:4880
-
-
C:\Windows\System32\calc.exe"C:\Windows\System32\calc.exe"2⤵PID:876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 163⤵
- Program crash
PID:1676
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4240 -ip 42401⤵PID:1428