Analysis
-
max time kernel
125s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
3dad99752800d2418553870b6e932c66.exe
Resource
win7-20240903-en
General
-
Target
3dad99752800d2418553870b6e932c66.exe
-
Size
793KB
-
MD5
3dad99752800d2418553870b6e932c66
-
SHA1
2ced778734d015bb2c974adeab24e5e315f848a8
-
SHA256
92f656d44d38fbc5e7964e36634bf95d18e157228624d1b38ea933633579ddc4
-
SHA512
f4479e41b6790cb2254cf6d0b20d10d9500f5d27ae616ce7fe88185dff28b3bfccd2a512cd0c699c24defa8f6e19992132d50007ad1e5b319731219628a29a2a
-
SSDEEP
12288:FE6pc7/py8+9phJ9JnvMHYRNduSzk53+XkdtqaXL+Y6vh9GMl6EJJ:K/py8SVnvM4XNkaAuYsJ
Malware Config
Extracted
formbook
4.1
njo
thehungryaperture.com
vincemceveety.com
thebuildingmgr.com
babaobox.com
qykrot.site
wald-pack.com
yeasuc.com
toplevelsealcoating.net
seebeec.com
williamsburgcelebrates.com
bons-sites-web.com
rnlasermedspasolutions.com
tercerintento.com
oliloudalmatians.com
pj-kingdom.com
karen-elmir.com
wellhealthfamilymed.com
learningjourneytx.com
calmyourmidnight.com
nextuptechs.com
triadecleaning.com
eduukadvisors.com
hasnainrajan.com
anna-mueller.design
soulsearchsavvy.com
artbygarwood.com
izozoarts.com
flipsideprojectsapp.com
veromicro.com
lukgaming.com
bestfitannuities.com
rockempulse.com
ergosmartapp.com
baysansligiris2.com
testaun.info
bulldogenglishpuppyonline.com
osmanoglukimya.com
drdeepakkumar.com
klsicx.com
geteyeselast.com
desertviewtucson.com
reinvestmyit.com
breifisch.com
mighty-mats.com
lifestylecampersamerica.com
pickhotroom.com
xiqingba.com
ecoloversmarket.com
onevideoagency.com
reefskinz.info
quenchcreativeamarillo.com
rainbowmessage.icu
gamingnewscanada.com
edlexacademy.com
bouncingaroundnm.com
flashdancesf.net
dkuy.net
retorika-ks.com
hasanmedicalservice.com
heartandcrowncloset.com
jwbwhys.com
okaloosacws.com
bentonvilletigers.com
baitesw.com
disciplinemonkey.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2928-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/2928-16-0x0000000000870000-0x0000000000B73000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dad99752800d2418553870b6e932c66.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2160 3dad99752800d2418553870b6e932c66.exe 2160 3dad99752800d2418553870b6e932c66.exe 2928 3dad99752800d2418553870b6e932c66.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2160 3dad99752800d2418553870b6e932c66.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2704 2160 3dad99752800d2418553870b6e932c66.exe 31 PID 2160 wrote to memory of 2704 2160 3dad99752800d2418553870b6e932c66.exe 31 PID 2160 wrote to memory of 2704 2160 3dad99752800d2418553870b6e932c66.exe 31 PID 2160 wrote to memory of 2704 2160 3dad99752800d2418553870b6e932c66.exe 31 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32 PID 2160 wrote to memory of 2928 2160 3dad99752800d2418553870b6e932c66.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dad99752800d2418553870b6e932c66.exe"C:\Users\Admin\AppData\Local\Temp\3dad99752800d2418553870b6e932c66.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3dad99752800d2418553870b6e932c66.exe"C:\Users\Admin\AppData\Local\Temp\3dad99752800d2418553870b6e932c66.exe"2⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\3dad99752800d2418553870b6e932c66.exe"C:\Users\Admin\AppData\Local\Temp\3dad99752800d2418553870b6e932c66.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-