Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe
Resource
win7-20240903-en
General
-
Target
44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe
-
Size
684KB
-
MD5
180d0f081c8d2d4cbba592f2c6ef28c6
-
SHA1
12e23e366ef8468131638244a0482a79bccfd839
-
SHA256
44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2
-
SHA512
6aca9e9229f72bb3e5db249f63cea1276ec837ada8b26aed739d2d9ba314c79a8dfc57518b1e5892bb89708e2012b7dc02f31535a8798f4c73e3526a8ce6abf5
-
SSDEEP
12288:ht1cBZVdEkJqCV5GMqQ5l9b1druq+Vlt3Rm7GMQKF3NGXoi1+rPd44zMWXmoK6:hc1CCVTtlHKt3whPFdG4cwMeTK6
Malware Config
Extracted
formbook
4.1
k02d
thenewworlddiscoveryclub.com
llzwfe.xyz
iymanlanka.com
woojunepark.com
holwetheleam.com
roylc.xyz
squirmed58yum.com
quzupuu.website
laprxa.com
avanlahe.com
sertseks.net
wfows.xyz
ny5622.com
strictlyvulgar.com
modabet801.com
jerryzconsulting.com
idolboat.com
decorbydenielenicol.design
clients-sfr.com
voicesafricamailings.com
ggato.life
charming-shot.xyz
ixgwe.xyz
windowcorrode.top
planeteducationnepal.com
atfalina.com
weedy.pro
miningrigz.xyz
iamvanessawhite.com
jobazeu317.xyz
ob0k1dyae12b.xyz
kurissuyuji.com
vanderhags.com
shedachu.com
millionairesprime.com
7fnv.com
kortprint.com
servisol.info
cltxmmo365.com
unmusicvideo.com
screamingfrog-download.net
kizuna-c.biz
4matic.xyz
intvlas.store
lascip.online
gobita.pro
plantalsomaterial.biz
luckydomino.net
questsidegaming.com
momentsinmonterey.com
flower-kamakura.com
ke668.xyz
theaircommander.net
sunlife.space
cult.contact
klt-cp-ga.xyz
excellent-e.com
hd5dh4u6r1ugvm.xyz
completevitalitycv.com
empoweringperspectives.net
xcd11.com
moonsnooze.com
dailystifle.website
xjzhcl.xyz
prekyshop.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/1004-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2884 set thread context of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 1004 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 1004 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2796 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 88 PID 2884 wrote to memory of 2796 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 88 PID 2884 wrote to memory of 2796 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 88 PID 2884 wrote to memory of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89 PID 2884 wrote to memory of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89 PID 2884 wrote to memory of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89 PID 2884 wrote to memory of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89 PID 2884 wrote to memory of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89 PID 2884 wrote to memory of 1004 2884 44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"C:\Users\Admin\AppData\Local\Temp\44ad61b91dc10bd9543918779a57235081fad13eada8330d03994c660be3c9e2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-