Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe
Resource
win7-20240903-en
General
-
Target
d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe
-
Size
936KB
-
MD5
bfb9abb75108871639ab6341d97677b4
-
SHA1
f1dff2faef0a0e3e74ffcebb4b6aee8fb512c274
-
SHA256
d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb
-
SHA512
a98430ba24fd3048422b99d1c8fc94f3094b7ec20aea571ad0ab5191f934cf8f6a93f50e3e65e2612204873078f63ce33ab6fd6b4d8bb8a661a1a6a08f4cc49f
-
SSDEEP
24576:Qlubg3rMXy/fzfEarna8MFeN2ZtZzi10:Q4s3Yi/fIaras4Zzi1
Malware Config
Extracted
formbook
c1no
NOAZ1GtFnUx1bqjUWmD6
sUBk3CYAoWuQfq3UWmD6
5vwrVl0msDtpEkYt
VtL6sSoIchhMStcj5DxYbm3FBw==
BKjy1ZxyhhuJ2guPWUI=
eAgklPLAE7zgqOmwRqPNOQLXz1Y=
aApC9n9Zp0ZhObwjLLLUAg1cjsx6Lg==
OrLZYLeFBavC1cD5+A==
jJm87eu4hy/QMbYE/wzDRQLXz1Y=
s63OS5RsBKrY3FurpDZXbm3FBw==
hyxwKsePxJNCwwejbEg=
l5667e2vQOkM4hFPE5yA0Q==
wTtVQBT04YkyoNKoN53GFV9m2hpS
+pzWhBnS26FJqiRyZXQrqR1Ow/1B
d/VHx031x5W2
GjhhiKSDZ/1txQejbEg=
nDhRjp5e9JeQiKzm+gqI41hdV5nFhsI=
ws4wtUMZYA1pEkYt
GazXV6Fr6akfcvxEOcbpTTCmMEq7Jg==
2vAOHufF5MT6VdU=
Rmesm2FJYQCwdLa4dn8tHKc0tsSMRfan/A==
6PYJNksMyWn+TNBGQB/GmyCpMEq7Jg==
Fk3Kzl41C52WgvVUK5CSbjeE7XvqENr6
olaNRROnJwFpEkYt
bOL3cqB4Lb5u8hpVE5yA0Q==
UPhAL/jS6oo+0QuPWUI=
/n/q6bKEjFsQ1cD5+A==
+5/mpjYIUmnXNnK5upj1E8mT
PuAXz2ErflH/g6eZbfwmbm3FBw==
rUZUn6iDBMu+lg==
ammOBlkSZQ8xMWjk8g==
2Nbi4a9xZ0C0Qsg=
yXy3fBvsNUC0Qsg=
3OP8OEAwNtmG7eHtqP/y
aZfJwo9uhflo0AejbEg=
rlKRSty85XfkPcQf67s2jwwHuOrqENr6
VujyOjoYA555frmhOEA=
5lqQRs+a5o25zgnSZDOgfC/0swL69ajj
9xtRcMJdYA8=
WAhN/oJdfxe9NlRB+pmEA4c=
zYi59Q3pfRM9NHJE+pmEA4c=
3XSFxN+uZwCrL2QxujpZbm3FBw==
haa1wH9dq3IVdt07FfeZcSUHMF2tMQ==
lJa6H2UyslV9atQXt5r1E8mT
NDRjkZ97O9Zw9zCOZUo=
qZ7TO5F298Ly3Fu/vT5cbm3FBw==
rCRIQQ/W47Nn5SuyelE=
+BYq7oZaeQZ2xwejbEg=
Tvs24IVjt1RzaqLUWmD6
xecmWVw0Ca5OxvnKE5yA0Q==
3mx+AzwMxJn2Qr86Ri37bWDlYG/pPw==
9mt5fMuwMAFpEkYt
kio7eXZGFaY/lht2VjqoCrkC+zmtm8g=
hQIf02FBly5EIlVLGCPTwzqpMEq7Jg==
6h9in6mDBMu+lg==
FfoRVGQ48Hlwd6bUWmD6
o7/v/Mq18YadfL1VGjGK1w==
o8oJTk8sPAH30g1PE5yA0Q==
d6XZ3J6Cw2SCeq3UWmD6
KlSLmF81NspzLTML7w==
oZuwp21CK1BpEkYt
4gBJdJRq/pvS1VJNAZduYFBRDl4=
7iFaThnsDL5k5Finp5j1E8mT
HdIf10k3z6LNwv79zCpObm3FBw==
virusalert.online
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5048 set thread context of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1096 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 1096 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99 PID 5048 wrote to memory of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99 PID 5048 wrote to memory of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99 PID 5048 wrote to memory of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99 PID 5048 wrote to memory of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99 PID 5048 wrote to memory of 1096 5048 d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe"C:\Users\Admin\AppData\Local\Temp\d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe"C:\Users\Admin\AppData\Local\Temp\d2f322cb15f591ef314eda3cb164f8ab0ca0048f89c8694cf9bc6ca39a2785fb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-