Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
Resource
win7-20240903-en
General
-
Target
c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe
-
Size
1.4MB
-
MD5
9d2f586afb6c4b2e82e049702948b928
-
SHA1
38e04f9da21e7c671d2183dc3013dcddddd9aa18
-
SHA256
c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57
-
SHA512
8436c64227573862934c3008129dcf09168e43604dde72d2547c63e6a501db8a9834a0170c7855a4044392ed6c4d44cb858a25514342239b7cc376ede0503a0e
-
SSDEEP
24576:wu6J33O0c+JY5UZ+XC0kGso6FazbJQxGpVs5ia/5qX9cUtFl4u4KYM2WY:6u0c++OCvkGs9FazbJ6r5ia/5Q99FyfP
Malware Config
Extracted
formbook
3.9
k0d
actanoverba.com
karenmckaylegal.com
magiatelier.link
asseto.co.uk
511227.com
friedharf.net
awesomebtc.com
cooperativatci.com
7r62wq4m2c.com
vetswhogetmarketing.com
supramvp.com
reusablecanninglids.net
skygouwu.com
51shengyuan.com
selekamenorezac.com
yt7876.com
haapaniemivalley.com
smlc8.com
transitium.com
dunkflre.com
baltimorek12tutoring.com
qinfeng360.com
80annstreet.com
eletricstation.online
60707n.com
nebraskastatesoccer.com
specializedcorp.com
7895hsp.com
materialistfiction.com
satta-king-delhi.com
123nuisible.net
3160pe.com
firmtoken.com
smartdavenport.com
1p1eightother.men
shesking.com
mahagurumarketing.com
simplyoneden.com
kalikambadevelopers.com
homeopathy.rocks
cintrax.life
discountrewards119.com
fandomcontest.net
hanssyny.com
royalheinous.com
tivyantlers.com
pallamer.com
karmaaedits.com
biharbord.net
jordkb.com
file2017taxes.com
simarentacar.net
zc2gpc.com
0913.ink
fromlexiwithlove.com
southfloridacraneandcooling.com
karimova-lola.site
by-nabilla-to-anthony.com
oliveiraengenhariaam.com
frantalia.com
bridginthegapofaurorainc.com
thecoconuthut98502.com
todoingio.com
fahrsicherheitstraining.expert
norjax.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2700-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral1/memory/2700-5-0x0000000000E10000-0x0000000001113000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2700 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2700 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2792 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 30 PID 2696 wrote to memory of 2792 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 30 PID 2696 wrote to memory of 2792 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 30 PID 2696 wrote to memory of 2792 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 30 PID 2696 wrote to memory of 2816 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 31 PID 2696 wrote to memory of 2816 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 31 PID 2696 wrote to memory of 2816 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 31 PID 2696 wrote to memory of 2816 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 31 PID 2696 wrote to memory of 2948 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 32 PID 2696 wrote to memory of 2948 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 32 PID 2696 wrote to memory of 2948 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 32 PID 2696 wrote to memory of 2948 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 32 PID 2696 wrote to memory of 2700 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 33 PID 2696 wrote to memory of 2700 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 33 PID 2696 wrote to memory of 2700 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 33 PID 2696 wrote to memory of 2700 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 33 PID 2696 wrote to memory of 2700 2696 c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"2⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"2⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"C:\Users\Admin\AppData\Local\Temp\c8cab884daba148b1c8cd717f20b90cf4a2ca3c3c9f476b2da13e1be9272ba57.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-