Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 17:57
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
General
-
Target
dump.exe
-
Size
182KB
-
MD5
e0f9c6faa04bb24a6997ebe182b18ac5
-
SHA1
cf6cdc1a57321f22cbb37e87ab8238fc9adfe1a0
-
SHA256
299989e3af67223f86fd525ddcee21eb65dc912be836376717177045fd7ea032
-
SHA512
7286994b3b8efca7da0145261e0565a3921beec177dbe147dee71f9ffcee3568e38bd1a965c21f2507259c33ff9fd7a62c553bb397008dd9688d2d90f428fb86
-
SSDEEP
3072:hbxlxKeZ0r9wNa5L7BGSKiRxb5hzx+RGT7Qh4+GGJqmvZ/5c:NxuXv5XBGDixb5hV+csp2m3c
Malware Config
Extracted
formbook
4.1
pjt2
bankruptcyhelpflorida.com
yourpropertymanager.info
inevitablebites.com
liviabelezaa.com
bartonhuxley.com
headhuntersmc.com
karoshejeans.com
trevorrentals.com
overseas-assets.com
zpchanglong.com
bconomic.com
devilishweb.com
eagleusacoffee.com
thirdpartyinc.com
newyorktowservice.com
barbrs.info
digiceuticalindia.com
ftytqwfl.icu
cabinetinfirmiergomes.com
waystoconserveelectricity.com
myskinresults.com
dazhong68.com
jsud.works
extremeasset.com
theyardcardzstore.com
audrefashion.com
relandguy.com
corriescandids.com
kbuytita.com
vendemaiscorretora.com
bigbearpen.com
paraislainen.com
8aion.com
wingmanpay.com
studiowea.com
fullcourtfeed.com
veerent.com
bobbleheadstadium.com
ecoplansbrasil.com
indian-point.info
kupipuk.com
prediction.trade
simplyjandkbeauty.info
10oclocktuesday.com
richgamingtalent.com
wang-cheng.com
knockonwoodflooringservices.com
ski-occasion-pas-cher.com
duskyroseboutique.com
foursomeofexcellence.com
beijingzhoumo.com
morningdeworganics.com
glampingsparesort.com
dcepbox.today
realityeducationhk.com
invitadito.com
ssgsasia.com
desoulsante.com
tocsieumuot.com
natiemarie.com
securechild.net
ourconsultants.com
leadfromwithinacademy.com
ebraston.com
seniorjavadeveloper.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2892-2-0x0000000000030000-0x000000000005E000-memory.dmp formbook -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2892 set thread context of 3452 2892 dump.exe 56 PID 872 set thread context of 3452 872 explorer.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dump.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2892 dump.exe 2892 dump.exe 2892 dump.exe 2892 dump.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe 872 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2892 dump.exe 2892 dump.exe 2892 dump.exe 872 explorer.exe 872 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2892 dump.exe Token: SeDebugPrivilege 872 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3452 wrote to memory of 872 3452 Explorer.EXE 85 PID 3452 wrote to memory of 872 3452 Explorer.EXE 85 PID 3452 wrote to memory of 872 3452 Explorer.EXE 85 PID 872 wrote to memory of 3516 872 explorer.exe 87 PID 872 wrote to memory of 3516 872 explorer.exe 87 PID 872 wrote to memory of 3516 872 explorer.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dump.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-