Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 17:02
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
General
-
Target
dump.exe
-
Size
181KB
-
MD5
d2f440ffe559beb7145d3b8836b90594
-
SHA1
d9f44fe550b7452c2bcb6b77666256816bc2e21c
-
SHA256
7c5ce20cff54b08358d8d3651b4f4484a503f52fd130c03373cfadf1639af98c
-
SHA512
c5e370dbc03d622531b04544227e7d90626b239dd41aeca73311052f111a7d76b3a07856c16c55614856543a0e6ab6ff5b7079d3925c9c8d6768ac0ed289a19c
-
SSDEEP
3072:exf/OhHCx8QPS83jLrsu0KWCJ2gbeGD1OAbBNJZju5vbfe:eWx0SqjLrsRKWCJ/eGD1OAVRjuxbW
Malware Config
Extracted
formbook
4.1
cb3b
lghglzcnkx.net
bellezaperfecta.company
thelisaiboldteam.com
newzdoozy.com
prospectsolucoes.com
altmartshop.com
webbresults.com
abnehmen-erfolgreich.net
tammygauthier.com
nelly-pasquier.com
footballrevolutionbyluna.com
primeassociatesca.com
lxzhub.net
jhaalz.com
fribetong.com
realkings.net
kamalameats.com
tyuyou.net
katiecorcoran.net
rigatoniscc.com
rapidrodents.com
homexnow.com
omegaangola.com
detectorpulse.com
sd586.com
wallstreetcharities.info
renotomasyon.com
670online.com
hyskjc.com
magicalsmiles.info
akkads.com
saifu-magazine.net
batikku.club
chitaserver.com
xfintybrochures.com
stackablesllc.com
ox08.com
fundsmena.com
yljdab.com
thewetrabbit.com
webtopixel.com
yjweddingfair.com
gracebotanical.com
30dzb.com
funincredibleinflatables.com
amazon-f2.com
tonightstudios.com
browtopia.space
androidwerks.com
websiteforseo.com
survaf.com
delawarepistolpermit.com
perfection.center
panafricanet.com
bfcan.net
withageny.com
geckoinsider.com
rhinofinancialservices.com
priyanshuvishwakarma.com
fawu360.com
cmbartwork.com
dronners.online
sqysmx.com
sammorrisministries.com
vallme.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/3404-2-0x0000000000780000-0x00000000007AE000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3404 set thread context of 3424 3404 dump.exe 56 PID 5052 set thread context of 3424 5052 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dump.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 3404 dump.exe 3404 dump.exe 3404 dump.exe 3404 dump.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe 5052 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3404 dump.exe 3404 dump.exe 3404 dump.exe 5052 msdt.exe 5052 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3404 dump.exe Token: SeDebugPrivilege 5052 msdt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3424 wrote to memory of 5052 3424 Explorer.EXE 82 PID 3424 wrote to memory of 5052 3424 Explorer.EXE 82 PID 3424 wrote to memory of 5052 3424 Explorer.EXE 82 PID 5052 wrote to memory of 1796 5052 msdt.exe 83 PID 5052 wrote to memory of 1796 5052 msdt.exe 83 PID 5052 wrote to memory of 1796 5052 msdt.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dump.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-