Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe
Resource
win7-20240903-en
General
-
Target
b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe
-
Size
738KB
-
MD5
aeb7c4a1980beda13861ec919daacec8
-
SHA1
240df48558a0a96ce28c4f330951d68f9fb47ef7
-
SHA256
b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1
-
SHA512
d992ed2f63afb26587b607b8c0dbc077b40986d34234c1adb011b9df4dbdc38c3347a2fa42e8b290d8246f5fa3ee1b310a9d747540b31f0455f6682424a5d8ce
-
SSDEEP
12288:B+w6SIcd1AaaPTiQMSzHYf+yGyJnwm7k9Ha60QruW+9OIo03haKv:Iwz07TFMAUJ3J5kEqpA9v
Malware Config
Extracted
formbook
4.1
v05y
vlastasamsonth.com
swankyeaters.com
digitalstar.info
katouchcommodity.com
armyworm51pud.com
shazhou.xyz
literatureforscience.com
nemitchel.com
embodiedwomanhood.com
clearoneadvange.com
cres.network
stanbicserv.com
theazted.com
trochumotorsltd.com
danielleclamare.com
solotime111.com
fancyproduct.space
starlinkinvestltd.com
famanhico.xyz
mgzz093.xyz
ksantey.com
curahint.online
wwwpsd.com
pa-danskebank.net
newfoundlandtshirt.com
lesgormanderiesdelpa.com
uniqabrand.com
mantelzorgsupport.net
juliyarose.store
groundiflowers.com
support-denchoh.com
proveterano.com
999writer.com
exec-code.net
deblanenterprises.com
crowdabilit.com
metastyyacincent.xyz
sucherkartei.com
awesometoknow.com
jefferyxbaker.com
eblivechat.com
everydaywellnessunlocked.com
murraysu.com
mobilityreimbursement.xyz
champiux.com
user-smsalerts.com
satnamcollection.com
lxbbank.com
peachtreeequity.site
nmedical.info
violadagambas-berlin.com
ipose.info
t8ybt.xyz
weredebtfree.com
tlpseng.com
davidsouza.online
wyjr.life
arspractic.store
geng138.net
mpo222goo.xyz
trmaceros.com
28573u.com
rvestdewseherore.xyz
yiliandh163.xyz
zurich-crypto-salon.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4196-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4196 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 4196 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2716 wrote to memory of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101 PID 2716 wrote to memory of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101 PID 2716 wrote to memory of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101 PID 2716 wrote to memory of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101 PID 2716 wrote to memory of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101 PID 2716 wrote to memory of 4196 2716 b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe"C:\Users\Admin\AppData\Local\Temp\b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe"C:\Users\Admin\AppData\Local\Temp\b479031f60b7199b24937d75aed26bc7bab0c3a20a8f79cd18d89a69c8ba8fe1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-