Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
YBCNP6X9PSJDXqv.exe
Resource
win7-20240903-en
General
-
Target
YBCNP6X9PSJDXqv.exe
-
Size
1.3MB
-
MD5
4dfab4ab0edef660557d063a7b787f32
-
SHA1
c55904a356c64da5812c07cdbc886fb64d80b2bb
-
SHA256
9ea19e6389c42486050f45551c33bf9d8f0b2417fc53975d97aebe477d368274
-
SHA512
94ca2be7e1ddd92abee498a1ccc44f7f79f14cab678faef4468000f2910b126aac2b4b423f050a78b2e03d1c7d19ec43908e49f6800b97dafe96de9d7a143489
-
SSDEEP
24576:c7XzodEMQ/3Q7+GOP0p2jQSM8eqIpQ916Ry/UE8izXOHtEga:cbzec3QCGd4jQB8LvocUdibOyga
Malware Config
Extracted
formbook
4.1
csn6
abmppo.club
a-great-dbt-cnsldtn-uk.fyi
intellidiets.com
giventt.com
mil-pay.com
endnotesg.xyz
balconygraze.xyz
cureply.online
musicmaster.digital
animevalhalla.com
nmtoinao.xyz
origotukau8.club
environmentalindustrial.com
loredanaprofumeria.com
marilynmarilynmarilyn.com
brodysinghhukpb.com
cangguavenue.com
themagicmoose.com
teamonston.com
cumthem.com
gteioeos.xyz
seylamapottery.com
fsts7.xyz
clanmeta.com
healingspaceyou.com
diskonmitsubishibali.com
gracelineage.com
freecoupon-engagementboost.com
utahorthotrauma.com
vaproor.com
fsptxd.xyz
2ymail.com
ramazanidavid.info
musicnwo.com
solfamidas.online
tnlakeretreat.com
fhastreamline123.info
friscowaterfrontwedding.com
idabelli.cloud
murrayresourcespodcast.com
delishishnes.com
liverpooldate.com
zentecfoundation.net
adaharmoni.com
onyxroseonline.com
etdrei.com
localtechnical.com
jazzartconnection.com
installfloors72hrs.com
melstefka.com
truth-index.com
daddybard.media
truckenergy.net
einleit.com
banqueescrow.net
jdavidtaxlawtookmymoney.com
chargeitonthedrive.com
cloud-hookah.com
thepottershousedemingnm.com
rustikal-wohnen.online
aprendoteca.site
thesirenseer.com
humalogichome.com
aitrainingacademy.net
dindeosh.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral2/memory/2164-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/2164-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/848-23-0x0000000000170000-0x000000000019F000-memory.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2124 set thread context of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 2164 set thread context of 3432 2164 YBCNP6X9PSJDXqv.exe 56 PID 848 set thread context of 3432 848 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YBCNP6X9PSJDXqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2124 YBCNP6X9PSJDXqv.exe 2124 YBCNP6X9PSJDXqv.exe 2124 YBCNP6X9PSJDXqv.exe 2124 YBCNP6X9PSJDXqv.exe 2124 YBCNP6X9PSJDXqv.exe 2124 YBCNP6X9PSJDXqv.exe 2164 YBCNP6X9PSJDXqv.exe 2164 YBCNP6X9PSJDXqv.exe 2164 YBCNP6X9PSJDXqv.exe 2164 YBCNP6X9PSJDXqv.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe 848 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2164 YBCNP6X9PSJDXqv.exe 2164 YBCNP6X9PSJDXqv.exe 2164 YBCNP6X9PSJDXqv.exe 848 netsh.exe 848 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2124 YBCNP6X9PSJDXqv.exe Token: SeDebugPrivilege 2164 YBCNP6X9PSJDXqv.exe Token: SeDebugPrivilege 848 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 2124 wrote to memory of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 2124 wrote to memory of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 2124 wrote to memory of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 2124 wrote to memory of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 2124 wrote to memory of 2164 2124 YBCNP6X9PSJDXqv.exe 98 PID 3432 wrote to memory of 848 3432 Explorer.EXE 99 PID 3432 wrote to memory of 848 3432 Explorer.EXE 99 PID 3432 wrote to memory of 848 3432 Explorer.EXE 99 PID 848 wrote to memory of 956 848 netsh.exe 100 PID 848 wrote to memory of 956 848 netsh.exe 100 PID 848 wrote to memory of 956 848 netsh.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\YBCNP6X9PSJDXqv.exe"3⤵
- System Location Discovery: System Language Discovery
PID:956
-
-