Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
zYqJmECKmhz499J.exe
Resource
win7-20241023-en
General
-
Target
zYqJmECKmhz499J.exe
-
Size
1.1MB
-
MD5
54a60fa86dd57e95fc68c25d2d2949a7
-
SHA1
cac7af8b3cdeb3bc61593311f3a6851c82d01a69
-
SHA256
b2bd364a32ee75888d9343bfc3a16b9eb58151fd94b4f3c38890f6ba2256b2e8
-
SHA512
b95cfb7209f92084d0a70126e123d009f5b170a5526eeefcebeae136779952a02a90e4f799b18759ab21fd9c4277234cbba24f0d81b23d183dddebe49d61a692
-
SSDEEP
12288:DJPgbYHTFyemCjEpTx0pchoZ2XjpXV8ME03wBwMfkc14c1L/UxDbX6U55uQIjLmf:XzFyEE2choONl8z0ATfkcacJYjAo
Malware Config
Extracted
formbook
4.1
uegp
firstregaljewellers.com
highgateshop.com
sorialab4.online
kurzneck.com
zonetechservices.com
akibul.net
khukhuanphongkham.com
lovelessneilsen.online
scholarlyresearch-guide.net
jagodda.com
comitivatratando.com
ynqjnx.com
rodarle.xyz
heroesjourneynft.com
weltreise.xyz
enstao.com
istilllmail.com
malayaoudh.com
xsdgia.com
palisadeslodging.com
howfitness.net
agenceweb.space
buildergrp.com
5aomen.com
aytaydecor.com
nnqdzp.com
hljktzl.com
kristinasdnemrozhdeniya.online
technologyprox.com
cultcutz.com
obatakimiko.com
theshaheenos.com
hooyotech.com
fifa.exchange
moftch.com
celinarofer.com
1sttests.com
gdmo112.com
yeswh.ltd
ceruleberth.com
wakuhair.com
jandthebees.com
iwjifw.xyz
careconvoy.xyz
rangerbudies.com
kfcare.com
jitteplusnikibi.xyz
balancebita.com
hypnoticbeauty.net
mcrosfts-update.cloud
bins101.com
migroskadinlarakademisi.com
orderingink.com
hyggehomesteader.com
roadstown.com
niezenrele.quest
amplifybrandmarketing.com
luxerlegends.com
hellogeek.digital
kellykhumalo.com
qianhaijcc.com
maquinasabdominales.com
harsors.com
islamiturksanatlari.com
blenderistic.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/3820-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3820-18-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3296-24-0x0000000000790000-0x00000000007BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3204 set thread context of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3820 set thread context of 3540 3820 zYqJmECKmhz499J.exe 56 PID 3296 set thread context of 3540 3296 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zYqJmECKmhz499J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 3204 zYqJmECKmhz499J.exe 3204 zYqJmECKmhz499J.exe 3820 zYqJmECKmhz499J.exe 3820 zYqJmECKmhz499J.exe 3820 zYqJmECKmhz499J.exe 3820 zYqJmECKmhz499J.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe 3296 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3820 zYqJmECKmhz499J.exe 3820 zYqJmECKmhz499J.exe 3820 zYqJmECKmhz499J.exe 3296 rundll32.exe 3296 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3204 zYqJmECKmhz499J.exe Token: SeDebugPrivilege 3820 zYqJmECKmhz499J.exe Token: SeDebugPrivilege 3296 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1196 3204 zYqJmECKmhz499J.exe 89 PID 3204 wrote to memory of 1196 3204 zYqJmECKmhz499J.exe 89 PID 3204 wrote to memory of 1196 3204 zYqJmECKmhz499J.exe 89 PID 3204 wrote to memory of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3204 wrote to memory of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3204 wrote to memory of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3204 wrote to memory of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3204 wrote to memory of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3204 wrote to memory of 3820 3204 zYqJmECKmhz499J.exe 90 PID 3540 wrote to memory of 3296 3540 Explorer.EXE 91 PID 3540 wrote to memory of 3296 3540 Explorer.EXE 91 PID 3540 wrote to memory of 3296 3540 Explorer.EXE 91 PID 3296 wrote to memory of 5000 3296 rundll32.exe 93 PID 3296 wrote to memory of 5000 3296 rundll32.exe 93 PID 3296 wrote to memory of 5000 3296 rundll32.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"{path}"3⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\zYqJmECKmhz499J.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-