Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe
Resource
win7-20240903-en
General
-
Target
d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe
-
Size
935KB
-
MD5
f5f3e2cde43a70def7697aafd955cfc3
-
SHA1
da7c220e7974b04b057fcdc7a5708a77b31e716e
-
SHA256
d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0
-
SHA512
8cb11c45fb7bec41638c55dface7188b9f647d77efe56e5791cf620c83c116cc93c408c46ee7ee3c3d48de272fb7e8dba601093cce83ef29f00ec901ebb16aa4
-
SSDEEP
12288:Ymele2oYC/0yzySje4oPVM3z0rcW0VOdpMLJ7szoUARCif+oqui:YS2oYY0cLVCVM7oMLlss7Cif+oqX
Malware Config
Extracted
formbook
4.1
rsea
aylagrey.com
ketoodavoqslim.xyz
foyfoy.ltd
buymistnow.com
ownempire.net
cie-revolver.com
kedaimks.com
rockbettergear.com
luminousfadel.com
universalbumpkeys.com
enjoyablestopnshop.com
grandesfinanzas.com
professionmessaging.com
thtoughthenight.com
conservativesshop.com
jimihoodie.com
nhlove.net
agentsheila.com
tilemarkng.com
94ei6mgy.com
www69188q.com
dominiclis.com
xinlanyuan.net
stipclub.com
educaterealestatepodcast.com
yourinsuranceconnection.life
imanicarton.com
dongxijiangpin.com
finanziariaruscelli.com
ashleyryannestreet.com
artbynadiaxel.com
delicioushq.com
chunqi888.top
ghjan.com
noyanlarinternational.com
wwgge.com
kiniecta.com
dupreportablebuildings.com
officialcaliyoga.com
stairsuppllies.com
langeculotte.com
celebrateocala.com
wiworwe.xyz
biaolingroup.com
mujid24s.com
jinyida.xyz
mavenpension.com
usreliacares.com
hotelspacasino.com
littycreationz.com
downtownfamilypharmacy.com
koinslot888.tech
almavivaranch.com
downloadmasters.net
heygotrip.com
stake-login.com
secretstation.xyz
lowesy.club
houtai12123.club
epiccaremedtraninc.com
maison-colette.com
andykaufmanisalive.com
bangaloretomysoretaxi.com
casaspecialtycoffee.com
funakelo.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2624-14-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2624 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31 PID 2328 wrote to memory of 2624 2328 d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe"C:\Users\Admin\AppData\Local\Temp\d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\d995cec041a5c5fd26a26941ed9daa203d1760a12d56fc743a1980b573503bc0.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-