Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe
Resource
win7-20240903-en
General
-
Target
3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe
-
Size
895KB
-
MD5
875316b1de1ba195d5458546d9048c4c
-
SHA1
feee43c84bab766aa064693cd90bfdd3b1011033
-
SHA256
3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44
-
SHA512
092679de1c48abaa26460d2fad87fb6a2c2b49e87a4afa69954a115fab7ac5070bbbdbe6d105de9f30eb9a38298314ab9cab9ce75fade5ff12342664f2b60ad7
-
SSDEEP
12288:sNDc9F3nC0Py3gAhY+5K3/7KCvEst0GYBTKoyAZt8hMlU2kEBoZd6aSst3tr1/NK:sbMjKCnt0btKoX8hokwoTt7rXWF
Malware Config
Extracted
formbook
4.1
gz92
ayurvedichealthformulas.com
plazaconstrutora.com
nat-hetong.info
eapdigital.com
ibluebaytvwdshop.com
committable.com
escapesbyek.com
mywebdesigner.pro
jianianhong.com
benvenutoqui.com
beiyet.com
theartofgifs.com
mbwvyksnk.icu
nshahwelfare.com
hhhservice.com
thechaibali.com
travelscreen.expert
best123-movies.com
leiahin.com
runplay11.com
oorulyh.icu
mypatchworkfamily.com
twerkwhileyouworkplanners.com
bradentonroofwashing.com
donandy.com
lonewolfchad.com
celsisenergy.net
humanweed.com
rosybakery.com
cookinwithsugarlious.com
1s5dnwzwv8tht8vi0v78kde4e.com
heyshopy.com
chibiaegyoshop.com
neverbrokerage.com
theadventurebench.com
psicologiapaula.com
xinke518.com
re-change.net
prodj-gear.com
iamworldwideshop.com
onlinemusiclessons.info
yxsc576.com
staniselevators.com
goldenleashcanine.com
luxormedikal.com
protectcentralcoast.com
jaysfinefood.com
zeneanyasbyerika.com
t-algorithm.net
busty-italian.com
bestlawnkzoo.com
bakeology.store
assured-justice-nl.com
sexf5.com
liveyourmaverick.com
mkt10697.com
suxfi.com
cardiociencia.net
truetoselfclothing.com
mcgrudersfitness.com
savorfullpoints.com
naturesblendsupplements.com
eseskalierteh.com
netechsupport.com
peggeorge.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1044-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3344 set thread context of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1044 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 1044 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3344 wrote to memory of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100 PID 3344 wrote to memory of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100 PID 3344 wrote to memory of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100 PID 3344 wrote to memory of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100 PID 3344 wrote to memory of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100 PID 3344 wrote to memory of 1044 3344 3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe"C:\Users\Admin\AppData\Local\Temp\3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe"C:\Users\Admin\AppData\Local\Temp\3dccb81826e0a102df3972e8ef1e8c534b1b3afed98f5fbebd45beab9bfbaa44.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-