Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe
Resource
win7-20240903-en
General
-
Target
89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe
-
Size
579KB
-
MD5
da066641d45b8563884830288bb340eb
-
SHA1
df2e5c731eaabc386c04feb696083f89b322e0d9
-
SHA256
89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7
-
SHA512
9b5351aebc8b49f04caff51b15ba4b9df72e52d724b4afe34283b9aed2ec80d2aa76387f9c82351ff484314c1f21a65ea1ac11147dcd67d6df5205da4571233f
-
SSDEEP
12288:ek6Q2PPeJpMAqir+pywsOWCpP4nPtolvGe52QedOUd:ekkneJpMAqiKtsOzGnlr
Malware Config
Extracted
formbook
4.1
ms84
ecurity-ukgaxq.xyz
45ee.top
risiddivinayaka.net
tizip-skill.xyz
ostcanadantet.top
764.xyz
oco188rtp.xyz
lobalacessory.shop
qcq-serve.xyz
dameth.top
arge-eycert.xyz
yzwj-she.xyz
bgfrp-plant.xyz
emesiartwork.net
rcw-hotel.xyz
loor-dfqzpi.xyz
vidence-zvkkln.xyz
oisthuchoyarura.shop
959108ttltxfm842.top
apzcc-both.xyz
duxrib.xyz
ridging-solutions-llc.net
ower-gxkwaa.xyz
elicorebiopharma.net
hlut-government.xyz
outh-kejj.xyz
dslot88b.click
xfetchbesnowsblacher.shop
all888.xyz
erform-tgap.xyz
ixiaopu.top
eiqiqikj.top
antuljiwa.click
vqq-national.xyz
rilseguloseheating.shop
uney.xyz
ord-km241124sdaqrwqsssafqw.xyz
uiejosdarksumdauts.shop
aby-qwjqlg.xyz
xcoy-product.xyz
ressure-pkdpy.xyz
5syp.xyz
lue-kuukf.xyz
ccording-pqzu.xyz
elieve-nrrv.xyz
ltimatraceglow.pro
dgnmu-over.xyz
ittlepawprints.app
agieworld.xyz
vvfu-break.xyz
taff-ltpugj.xyz
kn510v1.top
oolhervelegerus.shop
mployee-jkmmz.xyz
4750.africa
weetlive.lat
achebrand.shop
uistnanciesnefast.cfd
isten-fwogs.xyz
cmk-billion.xyz
981gnk.top
ge-zgnfu.xyz
unwaleheathyhibbing.cfd
ikigorakos.net
uhy-key.xyz
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4572-11-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 740 set thread context of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4572 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 4572 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 740 wrote to memory of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92 PID 740 wrote to memory of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92 PID 740 wrote to memory of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92 PID 740 wrote to memory of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92 PID 740 wrote to memory of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92 PID 740 wrote to memory of 4572 740 89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe"C:\Users\Admin\AppData\Local\Temp\89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe"C:\Users\Admin\AppData\Local\Temp\89f618ae5abb8b3dfd00db8271c120503dff7ae17af576f4169ba4036f4562d7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-