Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/orcyebry.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/orcyebry.dll
Resource
win10v2004-20241007-en
General
-
Target
70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe
-
Size
358KB
-
MD5
7e9e3aeebbafdb0a1fa065ee5ad217ec
-
SHA1
6064e1dbc3129e3f69e701946d54191b42eb6a92
-
SHA256
70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156
-
SHA512
27fb97317d7484c3c770eb5073b682a76dd76bcb93c3475c979e0d7bf781f7d7de71a51761ea9ee239e53a2d39ad1e986cdc9efa22389934088daef3dec70d33
-
SSDEEP
6144:rGiF3GRJUnjyWkqKwmT20Wv60Dir1SNuaeTUqUPcLPTS43RIWi1ov2+fmIN5UgK:h3OJMLk5tESVTU8DTS43R4ovPfmWu
Malware Config
Extracted
formbook
4.1
s11o
xrayagitate.site
mirchana.com
ucdaloi.com
mdjzw.xyz
palladiumroyal.com
mrpipewell.site
besar-nih.com
hempfoodeurope.com
newsletter.chat
lgkfs.xyz
didaftik.com
krediburada.xyz
anzu76.com
olafskin.com
mijnlidmaatschap-anwb-nl.xyz
brazilcocktailbar.com
mcgavrin.com
136232.com
omicronvirusnews.com
spanishwithkurt.com
strikco.link
gibbyoutdoors.com
trendymanga.com
metasold.xyz
nurwikacollection.xyz
manapvb.com
bloodstalker.xyz
zartcreate.com
tonyppc.net
hqvanilla.com
talynt.fan
bxbcustoms.com
metamemorialhall.com
playchuckwheel.com
theprimaryschoolflorida.com
ingemeisal.com
452346.space
adoracreate.com
clustr.xyz
arilar.xyz
atrophyofme.com
lorticeptyiwaged11.xyz
bandhop.com
cxtatami.com
onlinewillsadvisor.com
thebridalindia.com
saveyourmemoriescouk.com
programeranel.com
solarenergybelarus.com
akinot.xyz
redrikana.net
sagecollectivehealing.com
nv59.com
eletromundo.net
810grindmode.com
bitcoinhomeless.com
crude-customz.com
hokaoneonesale.com
shifdc.com
boyutstone.com
orly-immo.com
syjakoz.xyz
partenaireinformatique.fr
astutepmcs.com
xn--diegovariados-zeb.online
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2516-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Loads dropped DLL 1 IoCs
pid Process 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2932 set thread context of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2516 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29 PID 2932 wrote to memory of 2516 2932 70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"C:\Users\Admin\AppData\Local\Temp\70849a1efa87c9363c62cdd0ca1ac5db34e13ae1e6803f5bcf4be9660b487156.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53b4056f9ef87716b0e0ed45da70d258f
SHA159efd5883fee51f07066e92753be09454444da62
SHA256a9b13e44fc7a247368e980cf20889619100caad4387662b639923eda30bcf9b9
SHA512accbe50cc40caf0b4b2d0569b67fbcaa64edf35a68104e23e7d941be7ccf2548ae9d1e9b4b271caff0f828220055f50f9176c9eed0871a1c056f6e7cc1d8a04d