Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe
Resource
win7-20240729-en
General
-
Target
89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe
-
Size
879KB
-
MD5
79dc6309e5428498138288258408ebec
-
SHA1
bd9b708b3743278df0a6c3a494dc8e3a0c89ed6a
-
SHA256
89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54
-
SHA512
1b2d3b0dd1e7f43264ed0cd535b4095efbf3f635b988893556450d3d9654fb6d494f8626984d31b7605730c7ad1a8b38e0bcb1bb24ad8099c81e96c78e156ce4
-
SSDEEP
6144:KrNLru22ulz4ntAC/cl47K9jYhCioJHBqVBixGQX1PfBOeVOdvXhNuxD9JJYWU:QNG22u+Aq+sMhqV+GQpfFVOxXhNu3JJ
Malware Config
Extracted
formbook
4.1
dxe
sardarfarm.com
959tremont.com
privat-livecam.net
ansel-homebakery.com
joysupermarket.com
peninsulamatchmakers.net
northsytyle.com
radioconexaoubermusic.com
relocatingrealtor.com
desyrnan.com
onlinehoortoestel.online
enpointe.online
rvvikings.com
paulpoirier.com
shitarpa.net
kerneis.net
rokitreach.com
essentiallygaia.com
prestiged.net
fuerzaagavera.com
soukid.com
moderndatingcoach.com
mentalfreedom.guru
bullishsoftware.com
sectorulb.com
outletyana.com
fptplaybox.website
artinmemory.com
buyruon.com
ljd.xyz
mondaysmatters.com
spiritsoundart.net
ixiangzu.com
lacompagniadelfardello.com
bnctly.com
sarasvati-yoga.com
0055game.com
lagrangewildliferemoval.com
umlausa.com
chaytel.com
kkkc5.com
union-green.com
philreid4cc.com
theanimehat.com
redlightlegal.com
myaustraliarewards.com
barkinlot.com
mujahidservice.online
nugeneraonline.com
sopplugin.com
makemyroom.design
ferienschweden.com
fps2020dkasphotoop.com
stylezbykay.com
royalpropertiesgurugram.com
birzulova.com
cosmicmtn.com
kissanime.press
poweringprogress.today
omsamedic.com
drunkpoetsociety.com
hostbison.com
asapdecor.com
houseofsisson.com
knighttechinca.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1336-15-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4308 set thread context of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 1336 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 1336 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4988 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 98 PID 4308 wrote to memory of 4988 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 98 PID 4308 wrote to memory of 4988 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 98 PID 4308 wrote to memory of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100 PID 4308 wrote to memory of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100 PID 4308 wrote to memory of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100 PID 4308 wrote to memory of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100 PID 4308 wrote to memory of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100 PID 4308 wrote to memory of 1336 4308 89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wpmCRnOONY" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFED2.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\89f32b16d874afc972f69f0108ccd4b163427bd30d66f2ee07f0771ac0f47d54.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD516e3ffb9318fdc1305eee43c5d1117d8
SHA1fca18461b131ea95214ba86c19adba9664b9c7bf
SHA25669c035e924a06e9fc56ad8a98b43ee32036f3d217c7fb222863df438f5b02a97
SHA512d2dceb01e3f1c901ec125592e7eb937cff46e53c8979eca7496b8ae47ce8c789a740ad1367a60816237e5900f38bfa67dd47daddeb0c8ca815117e26f09d9378