Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe
Resource
win7-20240903-en
General
-
Target
5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe
-
Size
956KB
-
MD5
1d0f9fe2578b015eba100952a39ded18
-
SHA1
304e4a2963f5071360a400545cfca885f8e4bcf4
-
SHA256
5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d
-
SHA512
4625f6655c098b011759f3da8027959ea1987e7d50dfd5364e1a297c0a4b641794579d558c0702a60d729438edfc2ce197accd843564c03ed773ce29696ee3b0
-
SSDEEP
12288:VaBXDylqDV1ZWtMhzGZ0GEdtARScCbD4AjM/4Kpi3sXsBqRO6PZXcQ6dhFcgAo:VaBelYYAJPARScCbKQN83ROthzA
Malware Config
Extracted
formbook
4.1
fr35
kantumusic.com
bswpcll.com
retaketomaxx.store
wyrak.site
chrisdc.com
myepower.net
manuscripttomarket.com
arthvisory.com
licvrb.com
iwacufinance.com
subha.info
jdksy.xyz
cdlyu.com
kinisehat.com
solidrockmultimedia.com
goconcepten48.online
efox8.com
elegantnewlook.com
samalaw-sa.com
otcwl.store
vsj386.xyz
maganify.com
kittyyeddashop.xyz
tongjibaseball.net
ursule.xyz
austinmich.com
escortslocal.net
10suplementospara.com
dingdingd.com
sa3adashop.com
sirecworld.com
wholeyeah.store
servicecylce.online
mc-cloudcade.com
drinkccirkul.com
alljamle.xyz
mycookbooklife.info
koreashope.com
hqhapp192.com
northxtarot.com
ikn60.xyz
rt4ikkr.com
viraleat.com
salmadeel.com
sellccvs.com
guzhipei.com
0gigig25.com
andolinavintage.com
sourcetimes.net
larrylecher.com
tunnel-max.com
help-ukraine-posters.info
patrickmullenmarketing.com
lianxidoors.com
qunjiao.xyz
regionbrotherbed.top
opticacrystals.com
nfcroad.com
pagamais2022.net
btefoinnovationlab.com
nvrmnd.team
cb-9-txfhflfsh8.xyz
stickly.fr
romanbuilder.com
shamoyongshi.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2068-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1744 set thread context of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31 PID 1744 wrote to memory of 2068 1744 5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe"C:\Users\Admin\AppData\Local\Temp\5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe"C:\Users\Admin\AppData\Local\Temp\5b65b6044cab0bcb44717f5e5b9b6793c3870604099dbd4b58531e6ac63cb15d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-