Analysis
-
max time kernel
96s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe
Resource
win7-20240903-en
General
-
Target
08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe
-
Size
781KB
-
MD5
9a0af6b629a159d928c7531584a39d36
-
SHA1
33edb3f17cc6bb15eab425d0c3361c68ec66fed7
-
SHA256
08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca
-
SHA512
e412eebc87755df3305680a478305e5212315e580742d3bc7bbfddc7278470e59103fb6c2d62fe94bf0980efd955dc3aef2243c2839efad4af9dcde385738b24
-
SSDEEP
12288:vFzHHK7zGJ7VCTbRCOb2yFO+ygE5HzMQhhEiMcYLFOXWxj8TVvUpS76VF8F:dzaiITXMHBkkX+4ZASA
Malware Config
Extracted
formbook
4.1
bcak
shizixiudian.com
thetimemerchants.com
rafflere.com
amosiagongbang.com
pikantepikariko.com
nationaltodaytv.com
anjielo.net
atlerz.com
cloudteamthree.com
cafelegume.com
gvniypqiy.icu
xn--schuldenzsurgesetz-ttb.info
jlxrcm.com
flowcraftnetworks.com
viberiokno-online.com
guisese66.com
farmaciaavicena.com
sealedgamescompany.com
eastonwestinc.com
szwmsz.com
fiqrasportspk.com
enigma.vegas
trendsuppliers.com
radialfilms.com
travellacity.com
tglnl.com
harmoniahomedecor.com
domaincrib.com
freemachinelearningtraining.com
njbcivilengineering.com
itrustpaul.com
jendelacerita.com
antiquestopandshop.com
itsallaboutpieblog.com
thriftingforlife.com
primalchildren.com
georgemichaelmyers.com
cdkinaorg.com
blizzaard.com
lechsistemas.com
hagiluck.com
formulae.world
orderkodu.com
thatcrazyketothing.com
shopspectures.com
binnerscrackers.com
desinfectar.info
rsw2229.com
leadslogix.com
hamdlmall.com
sakikomikado.com
citest1597730700.com
happy-paradise.com
globeestore.com
femarseguretat.com
silkamaze.group
melhorquebradesco.com
allforhealthyliving.com
2016conf.com
lianzhankj.com
minneapolismn.xyz
pblblog.com
bostknchannel.com
advertisingjobsplanet.com
resilientmomentum.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2480-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2480 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 2480 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99 PID 4804 wrote to memory of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99 PID 4804 wrote to memory of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99 PID 4804 wrote to memory of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99 PID 4804 wrote to memory of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99 PID 4804 wrote to memory of 2480 4804 08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe"C:\Users\Admin\AppData\Local\Temp\08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe"C:\Users\Admin\AppData\Local\Temp\08d852996cac29ea979d65f029908e1e38cfddca5738b1aad650e8a3eb0b00ca.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-