Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 16:30
Static task
static1
Behavioral task
behavioral1
Sample
3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe
Resource
win7-20240708-en
General
-
Target
3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe
-
Size
1.2MB
-
MD5
bb5c9e57a26aa1fa8b6de230a99af059
-
SHA1
33f066cf40b09bffc48001ae3641775b4f0c36de
-
SHA256
3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42
-
SHA512
5bf5314dd8c9e0a36f4841feb3d591f9a21c15178c3557ee23c95c125d6ea734043906bc01a163ff369e4a81b053e92b5f6d857628600f2946ca1d719c2d7d7c
-
SSDEEP
24576:Y+Q8BZFYIblhBYCh/pNo1pfDrhpFEeuS+pJg:dyE1pdpyxFEeuS+
Malware Config
Extracted
formbook
4.1
kgdh
socialsecuty.com
rossiniconstruction.com
baliisterstore.com
walnuthotsouce.com
herculesmile.com
datum-maps.tech
yourhandhistory.com
reevolvehardware.com
condosandresorts.com
boissonsenergetiques.com
everybodymatters.club
titoly.com
knfsupplies.com
azitajovaini.com
orfilashop.com
aliceramsay.com
tipsyfetes.com
besttrip.store
ukrainianlandtoken.com
jdscornerbar.com
sortofopinion.com
facialhq.com
trolleyboyretail.com
bettla.com
healthgroupactive.com
washingtonsqapartments.com
energiadoser.com
rpas.one
vtnywvebs.club
lesspricesale.com
profininc.com
roninkits.com
saintduck.com
odziez-reklamowa.com
topchoicedebtzero.com
eleutheraevents.com
pmmfddd.com
mehranagoldgallery.com
kupolinkshell.com
thevesta.pro
yescoment.com
metrotreasurybanks.com
bbluebeltlivewdshop.com
1motivational.com
burseomde.com
viaqraonllne.com
myhomedecorations.com
roundenglish.com
streamableav.com
manukaskinco.com
phukientrangsuc.com
guatemalamasks.com
gopeer.online
coloradocowboychili.com
azmayesh.academy
locdessntls.com
violentarchitectures.com
wasatchcarclub.com
eliteconcrete.pro
samferrer.com
define.digital
jokysun.com
scrapsandfun.com
versiontechnology.net
totemosuguremono.online
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2900-14-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 2900 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3004 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 31 PID 2368 wrote to memory of 3004 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 31 PID 2368 wrote to memory of 3004 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 31 PID 2368 wrote to memory of 3004 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 31 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32 PID 2368 wrote to memory of 2900 2368 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"2⤵PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-