Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe
Resource
win7-20240903-en
General
-
Target
f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe
-
Size
1.2MB
-
MD5
0909c0f35eb5d8693d0a572aca2b8c74
-
SHA1
f68481fff291de0a55fa7b43f01e7905a027f56c
-
SHA256
f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817
-
SHA512
c79ef0d31921d37f1585c66bd351167a249b36da9b359ca98e865c47a852809b08514fcb2bc4f58f35685ff4cb6a65805aefb4361bedb3344821f80e039d562b
-
SSDEEP
24576:B/w4Tcww2frV8+iphCxvA6FzTXtJo0WpzuAl8BNeLc:B/wg3xV0hczFzDnsvbLc
Malware Config
Extracted
formbook
4.1
dw4g
keundha.com
gss-india.com
neema.xyz
marscastvoyage.com
cafuti.com
empiredigitalworldnews.com
rumblebumbles.com
chevalpublications.com
rewindau.com
dskensho321.xyz
fywb-avff.com
locking-devices.com
getsomeincome.com
uva888.com
rrrf.space
timberlandobuwie.com
transferpanou.com
ikigaicornerstore.com
jervoisbrazil.com
savagereviews.xyz
aworldmart.com
opsledger.com
brainsnacks.science
fringwork.com
ycergbdzhdxfwjstvopimwfw.store
emeraldcoastmcdonalds.com
aomidenki.com
mutoros.com
casino777-191.online
phoenoisseur.com
gdjianshe.com
shoppingclube24horas.space
greysoh.xyz
supermercadoplaneta.com
hiranilawfirm.com
viscojoy.com
changeamindchangealife.com
lathewya.xyz
ccsdevelopment.online
ianisho.xyz
lazilyactive.com
wind-energy.biz
capaholic.com
lakefrontrestyle.com
bnbreadypay.com
aztarain-blanco.com
storeydrive.rentals
iiiav83.com
osccb.com
oatraining.us
darianopolis.com
eatmedarlin.com
jasaarsitekrumah.com
terrydorotheo.com
center-fix.online
storied.online
ohiomakeupgirl.com
mobileonie.com
crossup.online
zgwllndx.com
kentvebaskanodulleri.com
packnrun.review
789b.info
hauheung.xyz
germanshepherdpupz.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2256-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2256 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30 PID 2900 wrote to memory of 2256 2900 f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe"C:\Users\Admin\AppData\Local\Temp\f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe"C:\Users\Admin\AppData\Local\Temp\f301682053d5e2fd2982d90d37508983ac1bf5e630e66e553573709ce7e37817.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-