Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe
Resource
win7-20240903-en
General
-
Target
d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe
-
Size
1.0MB
-
MD5
31fc36dc329bcf9c029d7bb6b607fb3f
-
SHA1
fe6d078aee396f443ee11d3936c3a1c016bcb071
-
SHA256
d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b
-
SHA512
d80f7706d7644342c08d3f42f4fcab23d3d5b17f48ab40aebe4dee75cc915a64f5fe45c5d6b70a3ca20bfe3b2055b8fba05a94ea29bdcf08b4b2ccf70f9a2e21
-
SSDEEP
12288:vUEkc/3UT4OOtZ7+w17iRBXeFsk+rctCn9027wD0RpQMkVwN33LJ6BokRLgdF:vUY/vtN12fXm4rctcq8wnnKRJgW
Malware Config
Extracted
formbook
4.1
gnu6
offersdelight.online
scmsyorketown.com
kgnuyzd.com
fhzs66618.com
akomachinery.xyz
couches-sofas-41944.com
johnsonne.online
yovxy.xyz
dubeffer.com
weddingangpow.com
metaversesocialslueth.com
chaoticbliss.info
jasmin310.xyz
678226.com
eepicc.com
remindtron.com
kusumaslot.info
xyy02.xyz
uvziup.com
sarasota4golf.com
okadasika.com
daicnb.live
shoutoutpodcast.com
fh-iot.com
cleanscreens.online
pebou.com
tjwhcl.com
ciavaldinistudio.com
v2clogin.com
mibaodou.top
zilten.pro
029nk.net
cordova.agency
xinyichun.top
xiuxing128.top
altenbergern.com
smalltalkjournalism.com
ruixincapital.com
apex9.solutions
nationsbenifits.com
guidestare.com
jzlcad.com
horfilms.com
supremocnotrol.com
tahitibeachmassage.com
pinterlak.com
yskm.xyz
iheartyachts.com
bridgesfamilywellness.com
xn--80aqjfefhljq.xn--p1acf
gyjcwj.com
llyy.xyz
shunxiangjixie.com
seokgyos2.xyz
58massage.com
morganganzer.com
cd1.top
mariafarrelly.com
theprissyparty.com
sppliednutrition.com
echargewall.com
nxtaian.com
endercraft.fun
8868v23.com
vladmo.net
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/5044-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4716 set thread context of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 5044 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4716 wrote to memory of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99 PID 4716 wrote to memory of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99 PID 4716 wrote to memory of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99 PID 4716 wrote to memory of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99 PID 4716 wrote to memory of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99 PID 4716 wrote to memory of 5044 4716 d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"C:\Users\Admin\AppData\Local\Temp\d5b73f94baae872466c1f7435d9c3ee66c5bdd606b1bfbae775c9acb19f5c42b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-