Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
IMG_20220926_0001.exe
Resource
win7-20241010-en
General
-
Target
IMG_20220926_0001.exe
-
Size
1016KB
-
MD5
c29ade6cb629271fa32e3ecc97757826
-
SHA1
7113cc1f08981d89e4038d7159744e39dec08168
-
SHA256
7a2a46ce8e2392d8f1afc79912f86e540c30f1a8428ec455f14182c0131403ed
-
SHA512
ade3953e9ceb93875b91ffb77131a2b76a1bf763d34f0c690f44f178c35522bc5cf023671b98c73dca51ebb4ed3844f325cbacaf3ae6882541fbb3b902b7977e
-
SSDEEP
12288:edBMsHT+oXKSslNvgT5PqdOHQYleaIqHLJnt16K4HTN:yBRz+hOsOweIqrJt1
Malware Config
Extracted
formbook
4.1
te04
oaif.rest
snapchat25.site
ampenova.online
xn--kj0b57geuvy9e.shop
bravobistro.xyz
meebits-freemint.xyz
namaz.city
tdmanagement.info
ytumz.xyz
industrialized.shop
laviedouceexperience.com
aubolabel.com
semblally.shop
vistlink.makeup
adidaihoka.com
gabrielmanfredi.online
sheka.xyz
bcvn2.club
digitalwebtricks.com
poocoin-app-charts.online
landsharesfg.net
qxlbjp.store
dumptrailers4rent.com
today-trends-reviews.info
jfdhobbies.online
socialgamers.online
qahomecom.com
newbutterflyfoundation.com
winegunmen.com
transmecsped.com
xmsolutions.net
dkbbankingonline.click
ftuesgxb.work
runut.top
private-jet.click
courtesanscanada.com
xpressewa.store
atlantahomicide.net
34986.top
hkexchange.one
camper-deal.store
armadameganrental.com
kippcollegiateathleticzone.com
zijadsare.space
skia-fafb.life
fiumaralupin.space
gabrieliglesias2024.com
zhaopp1.buzz
meetapub.com
ju-8523.com
teamin.tech
douban.work
arubapiana.cloud
86602.top
musicbooksus.com
veganingrids.store
odukart.com
temporary123.website
altnmaia.com
friendshipengineers.com
euyasminmiranda.com
baijuyun.xyz
billiedruryrealtor.com
marachui-resort.com
joannedifrisco.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2624-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2624-19-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4152-24-0x0000000000490000-0x00000000004BF000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1176 set thread context of 2624 1176 IMG_20220926_0001.exe 92 PID 2624 set thread context of 3500 2624 IMG_20220926_0001.exe 55 PID 4152 set thread context of 3500 4152 wscript.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IMG_20220926_0001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1176 IMG_20220926_0001.exe 1176 IMG_20220926_0001.exe 2624 IMG_20220926_0001.exe 2624 IMG_20220926_0001.exe 2624 IMG_20220926_0001.exe 2624 IMG_20220926_0001.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe 4152 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2624 IMG_20220926_0001.exe 2624 IMG_20220926_0001.exe 2624 IMG_20220926_0001.exe 4152 wscript.exe 4152 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1176 IMG_20220926_0001.exe Token: SeDebugPrivilege 2624 IMG_20220926_0001.exe Token: SeDebugPrivilege 4152 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4116 1176 IMG_20220926_0001.exe 91 PID 1176 wrote to memory of 4116 1176 IMG_20220926_0001.exe 91 PID 1176 wrote to memory of 4116 1176 IMG_20220926_0001.exe 91 PID 1176 wrote to memory of 2624 1176 IMG_20220926_0001.exe 92 PID 1176 wrote to memory of 2624 1176 IMG_20220926_0001.exe 92 PID 1176 wrote to memory of 2624 1176 IMG_20220926_0001.exe 92 PID 1176 wrote to memory of 2624 1176 IMG_20220926_0001.exe 92 PID 1176 wrote to memory of 2624 1176 IMG_20220926_0001.exe 92 PID 1176 wrote to memory of 2624 1176 IMG_20220926_0001.exe 92 PID 3500 wrote to memory of 4152 3500 Explorer.EXE 93 PID 3500 wrote to memory of 4152 3500 Explorer.EXE 93 PID 3500 wrote to memory of 4152 3500 Explorer.EXE 93 PID 4152 wrote to memory of 1280 4152 wscript.exe 94 PID 4152 wrote to memory of 1280 4152 wscript.exe 94 PID 4152 wrote to memory of 1280 4152 wscript.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IMG_20220926_0001.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-