Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe
Resource
win7-20240903-en
General
-
Target
6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe
-
Size
873KB
-
MD5
b982805529ddd169f025e4f5897ffbb4
-
SHA1
c9bede65491464226dc4bd769a8a926d9a0fa178
-
SHA256
6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69
-
SHA512
b656fbe4bee42acc24d094bfa052c9e0b72741dcf9a03fb6161bd21f2f06bb15121f370774530ccee7aff6850fe279d431654610b40226aa2e851b9d2eeda1d7
-
SSDEEP
12288:L5MTdaVo0smtiK5oyZJnBfPjLR0lUExUEycWuJ2kIO7F9QK:ng+FoelPjtCx9Pfc/O7FOK
Malware Config
Extracted
formbook
4.1
t052
droogskateboards.com
royalspowersolution.com
lifebestmoves.com
rimpasac.com
crndhwv.icu
younggunrecords.com
rtdentalstaffing.com
2ktea.com
aiheim.com
cyberledger360.com
chrgo.com
1-alnafrica.com
reignbowssparkle.com
theexecutivestudio.com
stevebana.xyz
adenisikmerkezi.com
ralfboehm.com
chiyuedianzi.com
mjgqw.com
isiswilkinson.com
bolsasytapers.com
oanchun.club
xn--vcsr9nd2hesf.com
sebastian-linares.info
themiddlemore.com
youllsucceedonline.com
rustomjee.institute
7923599.com
msnbcrise.com
negotiablekite.com
qamishlo.net
heatwavesolutions.com
codebend.com
3muxue.com
clicklike.asia
digitalitalynews.com
cheapfreeruntrainers.com
goldexreturns.com
jqyba.com
banffjaspernow.com
cuttingedgegimmick.com
leswamp.com
uvaube.com
ourvideoindalastexas.com
wellcare-gs.com
nh96520.com
leviathanusa.com
weihnachtsmann-cux-umgebung.com
defenseinvestigation.com
ozgeerdoganyilmaz.com
ocd-diesel.com
munchui.com
finanteo.net
aimuseums.com
anneikaellc.com
yebhi.xyz
ohmygoood.xyz
vz329.com
zkitu.online
tlczj.com
ankikrit.com
catscratchco.com
citestaccnt1597752059.com
rapurp.club
liracosmeticsau.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2720-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2720-15-0x0000000000850000-0x0000000000B53000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2956 set thread context of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 2720 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31 PID 2956 wrote to memory of 2720 2956 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-