Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe
Resource
win10v2004-20241007-en
General
-
Target
6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe
-
Size
837KB
-
MD5
ca25cc1a0351513cbb0bb70343b03862
-
SHA1
69bf7182f7cd72ca775be7736b843345efbbdc0e
-
SHA256
6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4
-
SHA512
95d81f55e28b658cb8b6a53ab0d0601b49a2764fdb5e4f4a163fc88ba66538cc97ce11207b49c2f12b4ff9ecbbc3cca5d31f6b07c5113be80f21631cac7f57d0
-
SSDEEP
12288:WEoKggb2iNdvpc++HRBTEdG6gAGYN/lXXE5fRPcXUVtSlTOzYM2TgN/0s:zoKgK1XpSHbgbR04XWtUOmgi
Malware Config
Extracted
formbook
4.1
p63n
personalrecargas-arg.com
headsetaccessories.xyz
sunriseboutique21.com
ubeafrika.com
shopnyoot.com
driverksa.info
ilikespeedracer.net
akdambakdam.com
bethe1responder.com
gfhd.online
n9bot.site
hstyz.com
buyresellerdomain.com
matoaciganjur.com
mainlineb.com
q385-yogen.net
squamation.top
thebeardedcrow.com
cannaverse.xyz
cracksoftpc.net
hertok.online
mopygames.com
certifiedtechdirect.mobi
kahramanmarasgayrimenkul.com
wormbooklibrary.com
advisernutrition.info
frldsend.space
cavoc.xyz
hinsbrookbank.com
beertime.xyz
dollarvigilante247.com
veriprofessional.online
dresstheblacksheep.com
bunchichi.info
psyiqhpxrjwsmve.com
jelloartisan.com
hbqygl.com
klariondesigns.com
brightmindsahead.community
oliverpeoplesmalaysia.com
bidentist.xyz
ayurvedicyoggram.com
nataliestrachey.club
marktplatz-mannheim.com
newwebsitee.com
97089e.com
nikeboy1001.xyz
americanase.com
webster-sports.com
medivirtus.com
mdyy30.xyz
churchill.beauty
jacdia.com
sdlkrth.xyz
jun88k.net
tjetrainline.com
catscheck.com
lkfs.media
ggbcc.net
ytbwgeerw.space
marketingent.xyz
carollourieri.com
kawakamiph.com
topframelessglass.com
rainwaterbotanicals.store
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/memory/2356-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2356-16-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2588-23-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2908 set thread context of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2356 set thread context of 1208 2356 vbc.exe 21 PID 2588 set thread context of 1208 2588 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 2356 vbc.exe 2356 vbc.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe 2588 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2356 vbc.exe 2356 vbc.exe 2356 vbc.exe 2588 msdt.exe 2588 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe Token: SeDebugPrivilege 2356 vbc.exe Token: SeDebugPrivilege 2588 msdt.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2744 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 31 PID 2908 wrote to memory of 2744 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 31 PID 2908 wrote to memory of 2744 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 31 PID 2908 wrote to memory of 2744 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 31 PID 2908 wrote to memory of 2748 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 32 PID 2908 wrote to memory of 2748 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 32 PID 2908 wrote to memory of 2748 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 32 PID 2908 wrote to memory of 2748 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 32 PID 2908 wrote to memory of 2624 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 33 PID 2908 wrote to memory of 2624 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 33 PID 2908 wrote to memory of 2624 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 33 PID 2908 wrote to memory of 2624 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 33 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 2908 wrote to memory of 2356 2908 6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe 34 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 35 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 35 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 35 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 35 PID 2588 wrote to memory of 2636 2588 msdt.exe 36 PID 2588 wrote to memory of 2636 2588 msdt.exe 36 PID 2588 wrote to memory of 2636 2588 msdt.exe 36 PID 2588 wrote to memory of 2636 2588 msdt.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe"C:\Users\Admin\AppData\Local\Temp\6e294639b9e9dec345a4b9bdeb29bd5695ea2d84e0fa88633ece9e7e88ad2bb4.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-