Analysis
-
max time kernel
52s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe
Resource
win7-20240729-en
General
-
Target
e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe
-
Size
638KB
-
MD5
af4c1f1515a7e3156c5184ff9a3542f1
-
SHA1
ce0867236704c2e96dc85c4e71b57a3ba9000819
-
SHA256
e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792
-
SHA512
c18536f2158e43e6376b17e4e1e714ae65441b5393a8db4cd2254b25ab7444f0910700ee4767162265bdfccfc40c24476ea3ecc57567cfe5f80c2311ace285ae
-
SSDEEP
12288:46KHHTwWOTn9KtX3Q1H2/75he6bw6LfcQP:YnTaen0HQFU6bw6LkQ
Malware Config
Extracted
formbook
4.1
as31
satunusanet.com
intro3.xyz
000point.xyz
woreruq.xyz
yoursinglesnetwork.club
zdcqne.cfd
kkbtt.net
aflm1.com
slayback.net
metaverseuropeen.com
teng74.com
insgoat.com
willowgrovecoaching.com
pacwest.com.co
adleadz.info
ericanilsen.com
xdfgoiumk.site
oriondistribution.net
welltempered.xyz
futamatagawa-ekimae-shika.com
padsforpooches.com
luganepali.com
zsedw8.com
dewaik-plast.com
micrositebuilds.com
marketergyan.com
yandian688.com
ufsbda.xyz
xn--parklcke24-eeb.com
veuitverse.world
4834txprmu5qz3lovgm8257.com
pokebets.com
emea.systems
whboard.com
wise-automation.com
luxury-black.net
buergertest-covid.com
saudebrasilbr.cloud
exchangealanzi.com
sxdmzy.com
fsyjd.com
truebeautyessentials.net
yourgiftyourlife.com
likewux.online
23gjgjg19.com
aaffirmedbygrace.com
importywti.com
buttermilkcreekblog.com
sportybetbonuslive.com
okephoto.com
myfesp.com
erheidinopin.com
whengiversmeet.com
danhelll.com
perimeterx.xyz
nikkiscribes.com
flamesthebrand.com
juntingdianqi.com
tigranmelikyan.com
elvingrowth.com
bancypet.com
motionofbodies.com
jredfitnesscoach.com
greyroadn1.club
avisexpert.online
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2864-12-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2864 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30 PID 2308 wrote to memory of 2864 2308 e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe"C:\Users\Admin\AppData\Local\Temp\e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe"C:\Users\Admin\AppData\Local\Temp\e4d96258c51cc4e4196c566e116077e7dc443a153e2ab651268ccd09c003d792.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-