Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 16:30
Static task
static1
Behavioral task
behavioral1
Sample
3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe
Resource
win7-20240708-en
General
-
Target
3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe
-
Size
1.2MB
-
MD5
bb5c9e57a26aa1fa8b6de230a99af059
-
SHA1
33f066cf40b09bffc48001ae3641775b4f0c36de
-
SHA256
3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42
-
SHA512
5bf5314dd8c9e0a36f4841feb3d591f9a21c15178c3557ee23c95c125d6ea734043906bc01a163ff369e4a81b053e92b5f6d857628600f2946ca1d719c2d7d7c
-
SSDEEP
24576:Y+Q8BZFYIblhBYCh/pNo1pfDrhpFEeuS+pJg:dyE1pdpyxFEeuS+
Malware Config
Extracted
formbook
4.1
kgdh
socialsecuty.com
rossiniconstruction.com
baliisterstore.com
walnuthotsouce.com
herculesmile.com
datum-maps.tech
yourhandhistory.com
reevolvehardware.com
condosandresorts.com
boissonsenergetiques.com
everybodymatters.club
titoly.com
knfsupplies.com
azitajovaini.com
orfilashop.com
aliceramsay.com
tipsyfetes.com
besttrip.store
ukrainianlandtoken.com
jdscornerbar.com
sortofopinion.com
facialhq.com
trolleyboyretail.com
bettla.com
healthgroupactive.com
washingtonsqapartments.com
energiadoser.com
rpas.one
vtnywvebs.club
lesspricesale.com
profininc.com
roninkits.com
saintduck.com
odziez-reklamowa.com
topchoicedebtzero.com
eleutheraevents.com
pmmfddd.com
mehranagoldgallery.com
kupolinkshell.com
thevesta.pro
yescoment.com
metrotreasurybanks.com
bbluebeltlivewdshop.com
1motivational.com
burseomde.com
viaqraonllne.com
myhomedecorations.com
roundenglish.com
streamableav.com
manukaskinco.com
phukientrangsuc.com
guatemalamasks.com
gopeer.online
coloradocowboychili.com
azmayesh.academy
locdessntls.com
violentarchitectures.com
wasatchcarclub.com
eliteconcrete.pro
samferrer.com
define.digital
jokysun.com
scrapsandfun.com
versiontechnology.net
totemosuguremono.online
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1052-13-0x0000000000400000-0x000000000042E000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 1052 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99 PID 1624 wrote to memory of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99 PID 1624 wrote to memory of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99 PID 1624 wrote to memory of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99 PID 1624 wrote to memory of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99 PID 1624 wrote to memory of 1052 1624 3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"C:\Users\Admin\AppData\Local\Temp\3625a17b1c788e6936d2ef25a5d248f4bfd394a74a7b05e37145a70177428f42.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-