Analysis
-
max time kernel
73s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe
Resource
win7-20241010-en
General
-
Target
ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe
-
Size
738KB
-
MD5
bb1daddaf3592e05e82b0ab73e7ecd11
-
SHA1
e50eca290addbe7c13fde7c47f9297a2f4c59815
-
SHA256
ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6
-
SHA512
d38cf4b618e7a7a10ea4bfe2b44c77bab1986d872c3d611dfd3d40b63ce63f6f51e2d1b431ad31530a74230a42fd410eeae1caf17cc117ed0a2366d045a78adb
-
SSDEEP
6144:QyxwvjSY3fhgs3VIH9M7a+KXocVf1OqheTc4wscHLcE89KEaQe5xWwusXjR+C:lEuYPhgPlXJVJeTcRscHwE+reld+C
Malware Config
Extracted
formbook
4.1
ghgn
nongnongqingyi.com
memojav.net
nothingbutallgoods.com
qiubaogu.com
consumeru.net
whitesandretreat.com
protectingtherepublic.com
rkpnews.com
captaincobyscajunseasoning.com
happyfilings.com
mznqa.com
food-truth-app.com
16crystallake.com
theisanitize.com
livefeelinggood.com
skiniences.com
rethgi4.icu
bucky.cloud
massageexchange.club
drshesalipatel.com
empowermentking.com
ssdtest.net
vivid-beats.com
zskdkc.com
pearsonconnexxus.com
freshf.world
tijancompound.com
ljplegal.net
undtctyky.club
bestnewhomeconstruction.com
lcsdgbc.com
wholisticexecutivecoaching.com
installatoricappotto.com
bestweightlosskey.com
thenestkeepers.com
s89sf.com
pupzilas.com
ssgasie.com
funhandwritinganalysis.com
hififa.com
penyaluranpuk05.net
yourautomationsimplified.com
directconnectiontuning.com
twobirdswithonestoned.net
ompeaceloveamen.com
hghat.com
one-san.net
bhaihost.com
dajiangzhibo28.com
roboticstrust.club
inventconsultancy.com
minuit-trois.com
estudiodigitalrc.com
luisxe.info
roadtorainbows.com
cash4yourcart.com
mtae2.icu
bitcoinasks.com
babalawoolaifa.com
omnirera.com
thedesignertravel.com
baersland.com
ace-expertises.com
thisisnotacookbook.com
podseedz.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2152-12-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2152 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30 PID 2116 wrote to memory of 2152 2116 ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe"C:\Users\Admin\AppData\Local\Temp\ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe"C:\Users\Admin\AppData\Local\Temp\ae0ac982f4f70afcbbcffe130163b0d07f53eb4850001dc3e40cdc8921ef05f6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-