Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe
Resource
win7-20240903-en
General
-
Target
608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe
-
Size
1014KB
-
MD5
7d420aa49e35f1af9427ebb0ba555027
-
SHA1
c052fae4e080073d322aaaf185a35767d2c35c2f
-
SHA256
608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee
-
SHA512
b7f3c69c7ab137407d578fa41df21fdb3578ee6ea9f044f2a9555775059f6171f594d9ce229acd15d3625f813a9f85d521f84aa12b4a1671a3cf0f470ccce3c9
-
SSDEEP
12288:IlIKqEaiIj/C51Wy+p9rokT3SQmu/fz3c5aSIOknAyanFtAxEcm8:4IDdjO1Wp9rokT3PHzMN9CAnPAxFm8
Malware Config
Extracted
formbook
4.1
g25e
2491254125.xyz
hookd.gay
uxmelange.com
startupvision3.com
evanwoosley-reed.com
uspalupdser.info
lx0599.com
grupoiaez.com
londonpapershop.com
cremas.store
risespec.com
olivierverdoyant.com
creatednow.com
epicureanhometreats.com
iqijp.com
vcraftboutique.com
furnaristudios.com
dealsgolf.com
djwoojs.com
boatslave.com
godimitators.com
aliatransandlogistics.com
882201.com
canadachildbenefit.online
gfmiami.com
turtlesintenerife.com
hrbyky.com
battlegroundcalifornia.com
52012f.com
oonrmine.xyz
shivkrantitvnews.com
omegabotics.com
wlchsl.com
valuemetamorphosis.com
kghbjx.xyz
10555ff.com
shxmnykj.com
ononoo.net
hanus.tech
9j4.net
drenkol.xyz
ghv0656.com
llynmservice.work
xrwcshheh.tokyo
medbump.online
gongzhibo.com
theplayonline.shop
gmwrk.com
pho-enix.online
zaliangbao.com
izzatwaseem.com
techweek.xyz
sl8249.top
rhogicsom.online
recordtv.net
scbjams.com
swiftmusk.com
closetsbydedign.com
1985555.com
nutrycafe.com
snafoodfoundation.com
philltowingandroadside.com
bidolupartner.xyz
gjwluxa.com
esmemariang.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2568-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2668 set thread context of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 1080 2568 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2668 wrote to memory of 2568 2668 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 31 PID 2568 wrote to memory of 1080 2568 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 32 PID 2568 wrote to memory of 1080 2568 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 32 PID 2568 wrote to memory of 1080 2568 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 32 PID 2568 wrote to memory of 1080 2568 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 363⤵
- Program crash
PID:1080
-
-