Analysis
-
max time kernel
32s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe
Resource
win7-20240729-en
General
-
Target
89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe
-
Size
879KB
-
MD5
79dc6309e5428498138288258408ebec
-
SHA1
bd9b708b3743278df0a6c3a494dc8e3a0c89ed6a
-
SHA256
89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54
-
SHA512
1b2d3b0dd1e7f43264ed0cd535b4095efbf3f635b988893556450d3d9654fb6d494f8626984d31b7605730c7ad1a8b38e0bcb1bb24ad8099c81e96c78e156ce4
-
SSDEEP
6144:KrNLru22ulz4ntAC/cl47K9jYhCioJHBqVBixGQX1PfBOeVOdvXhNuxD9JJYWU:QNG22u+Aq+sMhqV+GQpfFVOxXhNu3JJ
Malware Config
Extracted
formbook
4.1
dxe
sardarfarm.com
959tremont.com
privat-livecam.net
ansel-homebakery.com
joysupermarket.com
peninsulamatchmakers.net
northsytyle.com
radioconexaoubermusic.com
relocatingrealtor.com
desyrnan.com
onlinehoortoestel.online
enpointe.online
rvvikings.com
paulpoirier.com
shitarpa.net
kerneis.net
rokitreach.com
essentiallygaia.com
prestiged.net
fuerzaagavera.com
soukid.com
moderndatingcoach.com
mentalfreedom.guru
bullishsoftware.com
sectorulb.com
outletyana.com
fptplaybox.website
artinmemory.com
buyruon.com
ljd.xyz
mondaysmatters.com
spiritsoundart.net
ixiangzu.com
lacompagniadelfardello.com
bnctly.com
sarasvati-yoga.com
0055game.com
lagrangewildliferemoval.com
umlausa.com
chaytel.com
kkkc5.com
union-green.com
philreid4cc.com
theanimehat.com
redlightlegal.com
myaustraliarewards.com
barkinlot.com
mujahidservice.online
nugeneraonline.com
sopplugin.com
makemyroom.design
ferienschweden.com
fps2020dkasphotoop.com
stylezbykay.com
royalpropertiesgurugram.com
birzulova.com
cosmicmtn.com
kissanime.press
poweringprogress.today
omsamedic.com
drunkpoetsociety.com
hostbison.com
asapdecor.com
houseofsisson.com
knighttechinca.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2036-18-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 2036 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2660 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 30 PID 2296 wrote to memory of 2660 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 30 PID 2296 wrote to memory of 2660 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 30 PID 2296 wrote to memory of 2660 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 30 PID 2296 wrote to memory of 2900 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 32 PID 2296 wrote to memory of 2900 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 32 PID 2296 wrote to memory of 2900 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 32 PID 2296 wrote to memory of 2900 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 32 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33 PID 2296 wrote to memory of 2036 2296 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wpmCRnOONY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43A5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"{path}"2⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD511b23046f6fb7816dbb4b391a863f94a
SHA12c188529063543a302df8ef85124a9084ad1fba7
SHA25604e023d5364409433a69a11033eeff4c6f9d5d793fe44bfe37f9a631610fc2f7
SHA51226b72dd58a99b24c20bee906ba80d250cb5f6861766f6eb426d982522436653ab0190ff8ba3c2b45728ea15df3e64d7bb567ec954167d8e94483fa339af4cb52