Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe
Resource
win7-20240903-en
General
-
Target
681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe
-
Size
1.0MB
-
MD5
2e968b52eeb924243e635aa8839e0ec4
-
SHA1
e6c64ea9a9d353881349fdc357d26a93370dab52
-
SHA256
681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5
-
SHA512
7d61d90e37481730a2666d6f54eb97371ff27d87bb6294b193837cab11e88ffbda174cae75d3401a4798627bec18fe7662596630e63e496eb7ef8b49b0ba36f8
-
SSDEEP
24576:ERcGuyEEeKrvDB+/ExV9ogVayp1q2d3WP8e:Fgow91u2W0
Malware Config
Extracted
formbook
4.1
bn89
mynorthernfcu.com
leafolux.com
joycasino-official-game2.win
shopfourfourteen.com
gzjyby.com
rapidwastedisposal.com
homme-alpha.com
essentialpowerwithin.com
emeralddrumcompany.com
dyspay.com
makedollarsonline.info
fredautosport.net
amzrelay.com
qtqqwdnbu.icu
lookingupproperties.com
twojemiasto.info
zrlin.online
mykabirmusic.com
mukulikamakeupartistry.com
mouridi.com
regenerator.finance
flvrtv.com
mucucus.com
sgbidding.com
theskinnycake.com
tomsriverfitness.net
higbpyh.icu
bitagui.com
cikolatakutu.com
contragio.com
resctub.com
gourmetproductsmarketplace.com
1541woodgroveway.com
baldwinparklistings.com
sheliadesignz.com
ciomes.com
eapdigital.com
tiascrafts.com
thefantechtic.com
xn--o79ap1y2ii1jc.com
homeofficesolutions.store
tardeidea.com
ayakakinoshita.info
thurstonpublication.com
yourtailoredwebsite.com
legalmktexas.net
skintherapymask.com
zhikuip.com
yujongtas.com
rexabernathylawfirm.com
virtualappraisals.online
xn--lmqrqm43lvth2rj.com
jiashengbo.com
ensolifestore.com
firmbuzz.com
kamala.wtf
carolinachefservices.com
thepowerofthefighter.com
triciavogt.com
eqarfinder.com
season14pubgmo.com
beyondthemindtherapy.com
cegielnia-rzucewo.com
wussyinc.com
oznacnekoho.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1880-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 688 set thread context of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1880 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 1880 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 688 wrote to memory of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91 PID 688 wrote to memory of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91 PID 688 wrote to memory of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91 PID 688 wrote to memory of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91 PID 688 wrote to memory of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91 PID 688 wrote to memory of 1880 688 681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe"C:\Users\Admin\AppData\Local\Temp\681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe"C:\Users\Admin\AppData\Local\Temp\681fe3b085850ef4d08c34692526d77bbe97a0363ed900e397f008a7274fa3c5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-