Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe
Resource
win7-20240903-en
General
-
Target
d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe
-
Size
1.0MB
-
MD5
31fc36dc329bcf9c029d7bb6b607fb3f
-
SHA1
fe6d078aee396f443ee11d3936c3a1c016bcb071
-
SHA256
d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b
-
SHA512
d80f7706d7644342c08d3f42f4fcab23d3d5b17f48ab40aebe4dee75cc915a64f5fe45c5d6b70a3ca20bfe3b2055b8fba05a94ea29bdcf08b4b2ccf70f9a2e21
-
SSDEEP
12288:vUEkc/3UT4OOtZ7+w17iRBXeFsk+rctCn9027wD0RpQMkVwN33LJ6BokRLgdF:vUY/vtN12fXm4rctcq8wnnKRJgW
Malware Config
Extracted
formbook
4.1
gnu6
offersdelight.online
scmsyorketown.com
kgnuyzd.com
fhzs66618.com
akomachinery.xyz
couches-sofas-41944.com
johnsonne.online
yovxy.xyz
dubeffer.com
weddingangpow.com
metaversesocialslueth.com
chaoticbliss.info
jasmin310.xyz
678226.com
eepicc.com
remindtron.com
kusumaslot.info
xyy02.xyz
uvziup.com
sarasota4golf.com
okadasika.com
daicnb.live
shoutoutpodcast.com
fh-iot.com
cleanscreens.online
pebou.com
tjwhcl.com
ciavaldinistudio.com
v2clogin.com
mibaodou.top
zilten.pro
029nk.net
cordova.agency
xinyichun.top
xiuxing128.top
altenbergern.com
smalltalkjournalism.com
ruixincapital.com
apex9.solutions
nationsbenifits.com
guidestare.com
jzlcad.com
horfilms.com
supremocnotrol.com
tahitibeachmassage.com
pinterlak.com
yskm.xyz
iheartyachts.com
bridgesfamilywellness.com
xn--80aqjfefhljq.xn--p1acf
gyjcwj.com
llyy.xyz
shunxiangjixie.com
seokgyos2.xyz
58massage.com
morganganzer.com
cd1.top
mariafarrelly.com
theprissyparty.com
sppliednutrition.com
echargewall.com
nxtaian.com
endercraft.fun
8868v23.com
vladmo.net
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2636-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1044 set thread context of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2636 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30 PID 1044 wrote to memory of 2636 1044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-