Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe
Resource
win7-20240903-en
General
-
Target
44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe
-
Size
684KB
-
MD5
180d0f081c8d2d4cbba592f2c6ef28c6
-
SHA1
12e23e366ef8468131638244a0482a79bccfd839
-
SHA256
44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2
-
SHA512
6aca9e9229f72bb3e5db249f63cea1276ec837ada8b26aed739d2d9ba314c79a8dfc57518b1e5892bb89708e2012b7dc02f31535a8798f4c73e3526a8ce6abf5
-
SSDEEP
12288:ht1cBZVdEkJqCV5GMqQ5l9b1druq+Vlt3Rm7GMQKF3NGXoi1+rPd44zMWXmoK6:hc1CCVTtlHKt3whPFdG4cwMeTK6
Malware Config
Extracted
formbook
4.1
k02d
thenewworlddiscoveryclub.com
llzwfe.xyz
iymanlanka.com
woojunepark.com
holwetheleam.com
roylc.xyz
squirmed58yum.com
quzupuu.website
laprxa.com
avanlahe.com
sertseks.net
wfows.xyz
ny5622.com
strictlyvulgar.com
modabet801.com
jerryzconsulting.com
idolboat.com
decorbydenielenicol.design
clients-sfr.com
voicesafricamailings.com
ggato.life
charming-shot.xyz
ixgwe.xyz
windowcorrode.top
planeteducationnepal.com
atfalina.com
weedy.pro
miningrigz.xyz
iamvanessawhite.com
jobazeu317.xyz
ob0k1dyae12b.xyz
kurissuyuji.com
vanderhags.com
shedachu.com
millionairesprime.com
7fnv.com
kortprint.com
servisol.info
cltxmmo365.com
unmusicvideo.com
screamingfrog-download.net
kizuna-c.biz
4matic.xyz
intvlas.store
lascip.online
gobita.pro
plantalsomaterial.biz
luckydomino.net
questsidegaming.com
momentsinmonterey.com
flower-kamakura.com
ke668.xyz
theaircommander.net
sunlife.space
cult.contact
klt-cp-ga.xyz
excellent-e.com
hd5dh4u6r1ugvm.xyz
completevitalitycv.com
empoweringperspectives.net
xcd11.com
moonsnooze.com
dailystifle.website
xjzhcl.xyz
prekyshop.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/3012-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2184 3012 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 2360 wrote to memory of 3012 2360 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 31 PID 3012 wrote to memory of 2184 3012 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 32 PID 3012 wrote to memory of 2184 3012 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 32 PID 3012 wrote to memory of 2184 3012 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 32 PID 3012 wrote to memory of 2184 3012 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 363⤵
- Program crash
PID:2184
-
-