Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe
Resource
win7-20240729-en
General
-
Target
6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe
-
Size
642KB
-
MD5
d836f401150d3edf804fb32e913cc1ba
-
SHA1
b6b96c22be56065a6015fd27eac39cfa33d50848
-
SHA256
6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb
-
SHA512
fcd711df3a7f36f456e9fc6d011c7721a2ddde0d90368737202285350bab3af592e2481e1078cc7aeec7ce79bffb991ce026ce0d4f5ec26d3b713213a9434990
-
SSDEEP
12288:kqp3tdo8hIoADb+1AYjnc7AwYjSlylSx1LS+I6+a48P/t22FTrEV9jy+:kK/87Dbujc7AwY2
Malware Config
Extracted
formbook
bnsk
9AsW/znAeYpXfCSzqhRFTGCvDg==
et5hNiI54PDQQC/I4nmjTdQWbc+6
bJfAvvqTZ4lgkErlyIp3Dw==
v0ll9N5E/gPcTUXoyIp3Dw==
HbVsl/0LWw1upJLjW4l1
QWmFotYu2pQrhToT+cw=
XJE5nuTJxdan2kk+/eJ9
krnX71nRoryQ2tM+/eJ9
+uFpF0mte3I8l02FRuUJyBtqfKWj
V/gEdE+0gYdi1J83LOKBSHULIHs=
Y4EUcain+4oZeFcA+m9L5CdxQXM=
GMrxaKLIoiyM
lMHmEiYwvnHaOd7315wVsAIN7Q5/2wY=
BgfXnORzfwCNfTvW
FyaIVv94/YvqCAmJ7+piQX6yFg==
fHX7sBijX4KI0c0+/eJ9
4P+jeOtxMEsbQfODnVR2TGCvDg==
EwWofOApn1DsEd5zUg==
k/28CWpPbftMrDB5E2J3TGCvDg==
7OAGFw4frLODrFroyIp3Dw==
XP8fj7m5/Z0wl0V+vdhLC3WAzfFd6w==
7lZm+ls2Iy4Kfj19UdC4P4WBzfFd6w==
o8OJSnnJm8QRPCnP
AYCuMmVSbOsSZxE7yIp3Dw==
r928QSF/Qn+Q0UU+/eJ9
I83rX42I2Gv4azoT+cw=
W/0r2X8MBHoRPCnP
JkRomwqRSQ6jGt7f9MY=
WXuisqGHx2/M+/48+9s=
6BTkqQSTYo1upFroyIp3Dw==
0kzy6ePE+qoJNvalMn60U0jas9scmdxL
lKdEDHHx0k2e15tAygq0f7q3
Q2Q4+EUseCeL5NE+/eJ9
9GS/SafIoiyM
M1ZORCUYaBOA30k+/eJ9
9BXVjgL8QvNWx0k+/eJ9
DjzmSyJpPmJOr3IlMsccLqSu
y+l84ij9Cpn+lFTk/3ugTXULIHs=
BS3UcVEwaRSpELjbukkx+2g=
0nH6MJ2pJ48gjj1oq80=
CXsMQKJeMkQSTUMBgVm0f7q3
+WL7RIWYkTSR
iI2hjsQlnzigAQZ1+ON/
oIcn9VCvJvcMOK8=
Tvv0rQ6irZKk/g==
KCLswz/Sj51qUTl1RQ==
EA8uVLb9fXfKNbY=
2YE9WqL/2/bI+YMF+G9L5CdxQXM=
NdnPcNbhQtgnEd5zUg==
CyoMGnYQeLEGNEIRaIFvTGCvDg==
o00bXslswEbVQd0+/eJ9
uV8JRKSlBbAPRM0EVVy0f7q3
r1DWtKm5ON5BeDoT+cw=
1AfcUEqpZ2w7VUWATw==
cWAO4FDHQc4qk5LjW4l1
oDoBMuwQjTI=
bA8wup0pP8Unhgn+4qBq
l5VnKozpVBR94NE+/eJ9
L0hcf9UZnqJ+7WNsnrxqQXULIHs=
rFT4NZCb13gUB9E+/eJ9
Tj1TRRkPos7lTgxRD4/FluYvzfFd6w==
cplk6tJZVmqN21/Y
iTLGouIxr62LFtRu5A60f7q3
7JNkaU9V03sMZdXnGAplco3DHn6r
admiral-juegos.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2632 set thread context of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30 PID 2632 wrote to memory of 2820 2632 6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe"C:\Users\Admin\AppData\Local\Temp\6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\6ca39f7a18248a826714e89d6cb52e7f952d36d3f3a7be1b96c6a5a39ec4adfb.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-