Analysis
-
max time kernel
52s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe
Resource
win7-20241010-en
General
-
Target
abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe
-
Size
665KB
-
MD5
ab63451afa0cfcaba8e5b555a3c00a3c
-
SHA1
d1f2b048c4b3cf31cf1e99c9d531109c33eab939
-
SHA256
abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2
-
SHA512
5d4e946e9b9b302af655c27e67a98bac6cf7184c1df974fdd2158a1ad46ba04818aea26419d8e6b6ab51de7944a9144cd68f16aeb7cc964c96cbc50d86f45fbd
-
SSDEEP
12288:Rt1mtiK5oBhiSXXRreHiKpQNyKTG1yPr4ZYPZ9RVATn2F/n4EsZ1XEnPHfOq:z1+FoB4SRolQXKYPr1fRTF/PmGP
Malware Config
Extracted
formbook
4.1
s3dy
ravlygte.info
marketnewsville.online
flooring-envy.com
flavourhouston.com
donghohanghieunam.com
globleitsolutions.com
digitalgraphicarts.com
cupidbeautybar.com
cannavybes.com
negative-dsp.com
littledali.com
meltwatersoftware.info
blackdogland.com
danasales.com
mississippiscorecard.com
mainesmoker.com
sirenxinlilzixun.com
tychehang.com
gentciu.com
weckloltd.com
posy-socks.com
smp2kroya.com
clientacceleratorchallenge.com
erlacollection.com
027tvs.com
thisdw.com
nonosmell-store.site
underadress.com
principal.properties
ministyles123.com
readtohappiness.com
roostercollection.com
veteransinfrastructureparks.com
theminiverse.com
auto-expresss.club
ciaokitchenandbath.com
sbsfresh.com
onesheart111.com
artofquiet.info
atecwtec.com
scars-finder.online
luckbaanasset.com
vegaguzmanstudio.com
destinedtowander.com
genesaloe.info
shirewindowcleaning.com
dwadawdf001.com
mividaurbana.com
outsiders.house
secondhandcare.club
1031exchangeintoreit.com
zenyoustore.com
bahissikayetvar.net
platforms.trade
dasmusstduhaben.com
frankplex.design
thesiblingsoiree.com
18sdsd.com
oneninelacrosse.com
hdsllawfirm.com
rawrequest.com
jetsetterlifestyle.luxury
karenmendell.com
aspydad.com
livelifevibrantcourse.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1380-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/1380-17-0x0000000000930000-0x0000000000C33000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1820 set thread context of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1380 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29 PID 1820 wrote to memory of 1380 1820 abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe"C:\Users\Admin\AppData\Local\Temp\abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe"C:\Users\Admin\AppData\Local\Temp\abc5f0bba372268d0f2bf14855e720c4bae3e865a23ef46a8f9adb31ed9934c2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-