Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe
Resource
win7-20241010-en
General
-
Target
ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe
-
Size
674KB
-
MD5
392537f4a1363d1f235ac4350096ca9e
-
SHA1
d5c285d8b23424170fac67084cfa9d40601b6f95
-
SHA256
ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353
-
SHA512
db9adad912cf892b4768478cf6c48bf9f2097158e99f7d254aa8f7dcc0c0ec6c2db740fa529ade92a7cc21ad02caacdb7185b57058331346814745618753b5d2
-
SSDEEP
12288:P0EbqWjsZ5uEd2iNmG1ZzfRDcq+CgwiqrUCrdSh2v9dK3y8f0N+1dboqwNDlt:8Eb/W5X1dzRAq+Cg6BrE+dKDf0M1db
Malware Config
Extracted
formbook
4.1
ps31
seekbeauty.net
yesfordata.com
renovationbrokers.com
foreversoultionsdeving.com
protmes.online
btobmediabusiness.com
crystalrosefitness.com
renewworldelite247ca.com
erwinsmith.pro
good-teahouse.com
haipiao.club
cristiansouza.online
travelscrapbooks.online
juskhasiat.com
loeilonline.com
ddjius.space
ltoiis.cfd
foundationrepairrapidcity.com
viptexasnotary.com
xn--2i0b30ronaj7nqsnyth.com
crookedoakpastures.com
mujeres-casadas.com
wwwparkbyapp.com
barbosaeheffner.com
dpkbx.com
wghrconsultant.com
sebastianbrill.com
rd-e.net
betmatik0233.com
tcwebvision.online
kidsleyy.com
99162.net
texasstarpharmadrugs.com
investmentassets.net
bayimikur.com
sutdunya.xyz
bestversionofyou.online
hablast.xyz
sleepfastfeast.com
siobhano.com
audioguestbookstl.com
houseofsouillac.com
jlprodutosonline.com
sitechagro.com
crowback.com
lifeinsurerdeal.com
homeoflabor.com
space-proof.com
ypfzzuefsz.online
carlos-rafael.com
dirkschade.com
linqcars.com
sexmaturemovie.com
speechpatthology.com
zimninja.academy
yugevip.com
6mhz.net
prettyandpowerfulbeauty.com
ideacomwcf.com
shallowtrick.com
junleshou.com
aurahealco.com
labtest.site
xn--3bsw45gdhjzrlpna.com
ilkalsareespsarode.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2280-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3216 set thread context of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 2280 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3216 wrote to memory of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91 PID 3216 wrote to memory of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91 PID 3216 wrote to memory of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91 PID 3216 wrote to memory of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91 PID 3216 wrote to memory of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91 PID 3216 wrote to memory of 2280 3216 ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"C:\Users\Admin\AppData\Local\Temp\ee251c7192a96cc30188ef633706e3e5d25b75cbfc80fe47ac698f5c4bd96353.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-