Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe
Resource
win7-20241010-en
General
-
Target
f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe
-
Size
621KB
-
MD5
fb46da403e7f8d031ccd553e79e8f5ce
-
SHA1
4385f614789f5472cab4f7f89d24dc3e454e05d5
-
SHA256
f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3
-
SHA512
624505e6df86dd4a09ae22acc3bcfa7e5e329adf8c0bc5cccd4236a9bb6901cce4eaeab52f01e94dc530ad5a353f6e736d13a75ee7c739329c88120b87083e14
-
SSDEEP
12288:SYxaM8KuQaGxtVMwg5a8CPWuImvsP4oNeA:8jQLMT/CTpvsQo
Malware Config
Extracted
formbook
4.1
i6sj
earn1kdaily.com
inspirestudiopro.com
dirtiblvk.com
humanbehaviourschool.com
tsftextiles.com
viveroeljardindelaabuela.com
surreykeys.com
sf790.com
evergreenmortuary-cemetary.com
pspbizhi.com
ironwoodpianostudios.com
outrageouslywise.com
blacklivesmatterisajoke.com
reignauto.com
azw3.net
nondapack.com
dressahaulicboutique.com
pierrockellelive.com
theleagueofgeeks.com
matthiaswalpen.com
essentiallyourscandles.com
fashionable5g.com
socialyouth.life
inspireleadershipschool.com
helpme3dprint.com
kvzedhicva.com
antorcha.church
redarmy2020.com
q88kk.com
iamsock.com
ivassociation.com
rothsteinlogistics.com
robustpaul.com
gaypridedirectory.com
stashan.com
hindinature.com
globalinkservices.com
wncadventures.com
nishinren.com
ntxelitefriendlies.com
mienfermentedbeanpaste.com
ketosisbulletproof.com
andreaslundgren.com
pamprivate.com
unfreeamericans.com
tenancy360.com
nieght.com
efectocoach.com
katharinehepcat.com
produkti-vr.com
batesvilletoolingdesigninc.com
gojourney.cloud
healthiercravings.com
tmd38.com
modulos.online
enierena.com
igarath.com
trippie.club
ibluedotpanowdmall.com
peopleplatform.co
mintanahudson.com
operasjonsklinikken.com
operation-alpha.com
mbpublishingco.com
ggoldcollections.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2928-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2824 2928 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 1220 wrote to memory of 2928 1220 f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe 31 PID 2928 wrote to memory of 2824 2928 RegSvcs.exe 32 PID 2928 wrote to memory of 2824 2928 RegSvcs.exe 32 PID 2928 wrote to memory of 2824 2928 RegSvcs.exe 32 PID 2928 wrote to memory of 2824 2928 RegSvcs.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe"C:\Users\Admin\AppData\Local\Temp\f561a1d05c09efc31dce8ab86eee986b5b47c1d92201c7c0eea132ab3a811af3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 363⤵
- Program crash
PID:2824
-
-