Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe
Resource
win7-20240903-en
General
-
Target
742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe
-
Size
1.1MB
-
MD5
c078c87514cfd7cae5d932325fad4625
-
SHA1
40ff7130fe87f96a133f41aea4eb9ff75be6a5dd
-
SHA256
742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8
-
SHA512
355f0badda14c4fa19fddf3419dc7994fb08c45f3657cdf7a7e208005c6c26b2f01f0df85031148e01031a32e6ae1ca1b76658e7b69b293670293bc2757c2e15
-
SSDEEP
24576:gMTzqeqLpLGq1hhh2czxF8Uo8J6Iti5lcIIoIhI:1TzqDDr24oUt6Iti5lcIIoIhI
Malware Config
Extracted
formbook
4.1
su4h
dopestartalentsearch.com
xeneln.info
jan-stollenwerk.com
footjet.com
globfun.com
drygoodsnola.com
cartayamedpsy.net
morganamelia.com
renoportapotty.com
cybertrucksclub.com
sl367.com
bandwagonpresents.com
npaczambia.com
infocom.management
gm0451.com
coloring-page.info
jibkokmaket.com
stickynoteplot.com
remonmikan.com
mcalweeimports.com
pocomagico.com
xn--seebhnegrlitz-pmb9f.com
wellnessheatclub.com
outragebroader.info
sgpropertymanagementllc.net
cadizseatrade.com
doctorpritzker.com
workitwithacircuit.com
marketersend.xyz
tight-fitting.com
atcommercial-co.net
revivalslohaz.xyz
superxsportswear.com
lorhsems.com
sharktankshooters.com
osprinters.com
nftcamping.com
eatnewcastlegateshead.com
bigroi.digital
harsors.com
valleybeneathstreet.xyz
night-rhythms.com
cosysunshine.com
flash-nail.com
thepoetrygiftshop-wholesale.com
coco002.com
corinnequinajon.com
gahmc.com
everydaypicks.net
memphisbullynation.com
sesese13.xyz
okrenufuvv.quest
nohu69.win
80cq918.top
chansneakers.xyz
switcheoz.com
ukgreensolutions.com
topvitaminasperu.com
biofo.net
truskinbeautycenter.com
facebook-url.com
mk585.com
answertitles.com
nojabnothanks.com
subquare.club
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2276-11-0x0000000000400000-0x0000000000459000-memory.dmp formbook behavioral1/memory/2276-8-0x0000000000400000-0x0000000000459000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1612 2276 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language instnm.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2124 wrote to memory of 2276 2124 742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe 28 PID 2276 wrote to memory of 1612 2276 instnm.exe 29 PID 2276 wrote to memory of 1612 2276 instnm.exe 29 PID 2276 wrote to memory of 1612 2276 instnm.exe 29 PID 2276 wrote to memory of 1612 2276 instnm.exe 29 PID 2276 wrote to memory of 1612 2276 instnm.exe 29 PID 2276 wrote to memory of 1612 2276 instnm.exe 29 PID 2276 wrote to memory of 1612 2276 instnm.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe"C:\Users\Admin\AppData\Local\Temp\742dddbb8dfa6ac7125c8f7de7197163c111ee6d8f1ff4ff0382db223c8461a8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\instnm.exe"C:\Windows\SysWOW64\instnm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 2523⤵
- Program crash
PID:1612
-
-