Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:02
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
General
-
Target
dump.exe
-
Size
181KB
-
MD5
d2f440ffe559beb7145d3b8836b90594
-
SHA1
d9f44fe550b7452c2bcb6b77666256816bc2e21c
-
SHA256
7c5ce20cff54b08358d8d3651b4f4484a503f52fd130c03373cfadf1639af98c
-
SHA512
c5e370dbc03d622531b04544227e7d90626b239dd41aeca73311052f111a7d76b3a07856c16c55614856543a0e6ab6ff5b7079d3925c9c8d6768ac0ed289a19c
-
SSDEEP
3072:exf/OhHCx8QPS83jLrsu0KWCJ2gbeGD1OAbBNJZju5vbfe:eWx0SqjLrsRKWCJ/eGD1OAVRjuxbW
Malware Config
Extracted
formbook
4.1
cb3b
lghglzcnkx.net
bellezaperfecta.company
thelisaiboldteam.com
newzdoozy.com
prospectsolucoes.com
altmartshop.com
webbresults.com
abnehmen-erfolgreich.net
tammygauthier.com
nelly-pasquier.com
footballrevolutionbyluna.com
primeassociatesca.com
lxzhub.net
jhaalz.com
fribetong.com
realkings.net
kamalameats.com
tyuyou.net
katiecorcoran.net
rigatoniscc.com
rapidrodents.com
homexnow.com
omegaangola.com
detectorpulse.com
sd586.com
wallstreetcharities.info
renotomasyon.com
670online.com
hyskjc.com
magicalsmiles.info
akkads.com
saifu-magazine.net
batikku.club
chitaserver.com
xfintybrochures.com
stackablesllc.com
ox08.com
fundsmena.com
yljdab.com
thewetrabbit.com
webtopixel.com
yjweddingfair.com
gracebotanical.com
30dzb.com
funincredibleinflatables.com
amazon-f2.com
tonightstudios.com
browtopia.space
androidwerks.com
websiteforseo.com
survaf.com
delawarepistolpermit.com
perfection.center
panafricanet.com
bfcan.net
withageny.com
geckoinsider.com
rhinofinancialservices.com
priyanshuvishwakarma.com
fawu360.com
cmbartwork.com
dronners.online
sqysmx.com
sammorrisministries.com
vallme.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/1672-2-0x0000000000EE0000-0x0000000000F0E000-memory.dmp formbook behavioral1/memory/1672-5-0x0000000000EE0000-0x0000000000F0E000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 2796 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1672 set thread context of 1200 1672 dump.exe 21 PID 1672 set thread context of 1200 1672 dump.exe 21 PID 2140 set thread context of 1200 2140 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1672 dump.exe 1672 dump.exe 1672 dump.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe 2140 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1672 dump.exe 1672 dump.exe 1672 dump.exe 1672 dump.exe 2140 msdt.exe 2140 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1672 dump.exe Token: SeDebugPrivilege 2140 msdt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2140 1200 Explorer.EXE 28 PID 1200 wrote to memory of 2140 1200 Explorer.EXE 28 PID 1200 wrote to memory of 2140 1200 Explorer.EXE 28 PID 1200 wrote to memory of 2140 1200 Explorer.EXE 28 PID 2140 wrote to memory of 2796 2140 msdt.exe 29 PID 2140 wrote to memory of 2796 2140 msdt.exe 29 PID 2140 wrote to memory of 2796 2140 msdt.exe 29 PID 2140 wrote to memory of 2796 2140 msdt.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dump.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2796
-
-