Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe
Resource
win7-20240903-en
General
-
Target
608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe
-
Size
1014KB
-
MD5
7d420aa49e35f1af9427ebb0ba555027
-
SHA1
c052fae4e080073d322aaaf185a35767d2c35c2f
-
SHA256
608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee
-
SHA512
b7f3c69c7ab137407d578fa41df21fdb3578ee6ea9f044f2a9555775059f6171f594d9ce229acd15d3625f813a9f85d521f84aa12b4a1671a3cf0f470ccce3c9
-
SSDEEP
12288:IlIKqEaiIj/C51Wy+p9rokT3SQmu/fz3c5aSIOknAyanFtAxEcm8:4IDdjO1Wp9rokT3PHzMN9CAnPAxFm8
Malware Config
Extracted
formbook
4.1
g25e
2491254125.xyz
hookd.gay
uxmelange.com
startupvision3.com
evanwoosley-reed.com
uspalupdser.info
lx0599.com
grupoiaez.com
londonpapershop.com
cremas.store
risespec.com
olivierverdoyant.com
creatednow.com
epicureanhometreats.com
iqijp.com
vcraftboutique.com
furnaristudios.com
dealsgolf.com
djwoojs.com
boatslave.com
godimitators.com
aliatransandlogistics.com
882201.com
canadachildbenefit.online
gfmiami.com
turtlesintenerife.com
hrbyky.com
battlegroundcalifornia.com
52012f.com
oonrmine.xyz
shivkrantitvnews.com
omegabotics.com
wlchsl.com
valuemetamorphosis.com
kghbjx.xyz
10555ff.com
shxmnykj.com
ononoo.net
hanus.tech
9j4.net
drenkol.xyz
ghv0656.com
llynmservice.work
xrwcshheh.tokyo
medbump.online
gongzhibo.com
theplayonline.shop
gmwrk.com
pho-enix.online
zaliangbao.com
izzatwaseem.com
techweek.xyz
sl8249.top
rhogicsom.online
recordtv.net
scbjams.com
swiftmusk.com
closetsbydedign.com
1985555.com
nutrycafe.com
snafoodfoundation.com
philltowingandroadside.com
bidolupartner.xyz
gjwluxa.com
esmemariang.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2936-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2832 set thread context of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2936 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 2936 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91 PID 2832 wrote to memory of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91 PID 2832 wrote to memory of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91 PID 2832 wrote to memory of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91 PID 2832 wrote to memory of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91 PID 2832 wrote to memory of 2936 2832 608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"C:\Users\Admin\AppData\Local\Temp\608355d27f442ae5c435b22fa9c5757fe324ad753eb48755cbd92b8aa1e161ee.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-