Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe
Resource
win7-20240903-en
General
-
Target
27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe
-
Size
878KB
-
MD5
032572e55c25a5d992039e1336d166b3
-
SHA1
675f2af8bae1fec0bd022c0c65afde54c92e2240
-
SHA256
27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b
-
SHA512
59339428fbec1872d2a4ecad775da9286facee3db1d1078284788b1edc7158f74c2939bed881f2821f2851540fbf5242895125b1737ab86f6acdb61919b7dbb7
-
SSDEEP
24576:QbYPbYPbYPbYPbYPbYEEb1TKtChyfcvR1BeV9tVJm02:Qbububububub01TKtCweeVTVo
Malware Config
Extracted
formbook
4.1
b6nt
mecchashonan.com
zzzu9.com
molliebellezza.com
ado-response.com
gurutech.design
gadgetavenuebb.com
ecomoscar.tech
makai-import.com
selotwinmax.xyz
kaihong08.com
biocyberlaw.com
crowdedhr.com
viagradb.online
mtbind.com
zcyq.life
mvideo.contact
brilliantconveyancing.store
onlythexclusive.com
metaverseintegrators.com
xn--ekakb-3x9h.xyz
rivuletfinance.com
defiinterim.com
le-bonz.com
createsurgical.net
meables.xyz
pe-brand.com
bar43siemreap.com
jbj168.com
goldlevelcoach.com
crotroll.com
eric.support
promocrauch.com
grecampus.com
bicupid.site
unitedearthwork.com
4834tkrrek16stvpvgs2999.com
githsubusercontent.com
familyfootcareandmore.com
twmica.xyz
supingstudio.com
pj4782.com
tl-texture.com
yingpaisi.net
fixtheusasource.com
pxsknd.info
0596xpjw.com
tasnimproperty.com
websitebaru.xyz
antakyaucuzarackiralama.com
womenfoodsustainability.com
efg9999.com
btorresins.com
zj530.com
bbegos.com
freepremium4all.com
gloosn.com
onewaypro.com
leijonapaita.com
bioaquapakistan.com
fhbhbb.xyz
viptrade.site
unbontravailleur.be
corapetservices.com
kyzzyk.com
arabiclearnonline.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral1/memory/2824-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/2824-15-0x0000000000930000-0x0000000000C33000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2824 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31 PID 1732 wrote to memory of 2824 1732 27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe"C:\Users\Admin\AppData\Local\Temp\27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe"C:\Users\Admin\AppData\Local\Temp\27c4e4c4bc0fed698e5908c6bf21599ed379fdb743a3d8946846fa19833fef8b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-