Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe
Resource
win7-20240903-en
General
-
Target
6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe
-
Size
873KB
-
MD5
b982805529ddd169f025e4f5897ffbb4
-
SHA1
c9bede65491464226dc4bd769a8a926d9a0fa178
-
SHA256
6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69
-
SHA512
b656fbe4bee42acc24d094bfa052c9e0b72741dcf9a03fb6161bd21f2f06bb15121f370774530ccee7aff6850fe279d431654610b40226aa2e851b9d2eeda1d7
-
SSDEEP
12288:L5MTdaVo0smtiK5oyZJnBfPjLR0lUExUEycWuJ2kIO7F9QK:ng+FoelPjtCx9Pfc/O7FOK
Malware Config
Extracted
formbook
4.1
t052
droogskateboards.com
royalspowersolution.com
lifebestmoves.com
rimpasac.com
crndhwv.icu
younggunrecords.com
rtdentalstaffing.com
2ktea.com
aiheim.com
cyberledger360.com
chrgo.com
1-alnafrica.com
reignbowssparkle.com
theexecutivestudio.com
stevebana.xyz
adenisikmerkezi.com
ralfboehm.com
chiyuedianzi.com
mjgqw.com
isiswilkinson.com
bolsasytapers.com
oanchun.club
xn--vcsr9nd2hesf.com
sebastian-linares.info
themiddlemore.com
youllsucceedonline.com
rustomjee.institute
7923599.com
msnbcrise.com
negotiablekite.com
qamishlo.net
heatwavesolutions.com
codebend.com
3muxue.com
clicklike.asia
digitalitalynews.com
cheapfreeruntrainers.com
goldexreturns.com
jqyba.com
banffjaspernow.com
cuttingedgegimmick.com
leswamp.com
uvaube.com
ourvideoindalastexas.com
wellcare-gs.com
nh96520.com
leviathanusa.com
weihnachtsmann-cux-umgebung.com
defenseinvestigation.com
ozgeerdoganyilmaz.com
ocd-diesel.com
munchui.com
finanteo.net
aimuseums.com
anneikaellc.com
yebhi.xyz
ohmygoood.xyz
vz329.com
zkitu.online
tlczj.com
ankikrit.com
catscratchco.com
citestaccnt1597752059.com
rapurp.club
liracosmeticsau.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2056-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 2056 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 2056 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91 PID 2548 wrote to memory of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91 PID 2548 wrote to memory of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91 PID 2548 wrote to memory of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91 PID 2548 wrote to memory of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91 PID 2548 wrote to memory of 2056 2548 6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"C:\Users\Admin\AppData\Local\Temp\6f4d39877281023ce9f36605ca14cc9a2bd3583fc65f8ac148753795b980cc69.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-