Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe
Resource
win7-20241010-en
General
-
Target
a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe
-
Size
868KB
-
MD5
f69ca46a59bc720a3edf4a1c3698418d
-
SHA1
f0e01c9a9ca63d1b1d507be06bc9aa2c044db500
-
SHA256
a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42
-
SHA512
835691dd5cf84e272384d5203b89e18c56f6509e74cb9fc60a4530e8fa27e292c76b91703b75940d1a4df4900e14dca376f494ebbb3ce92f8ee6f24b2de159d6
-
SSDEEP
12288:exTd+lc9ogYATuMFct1sPdqrQ8IvPHMvUok5pPzoADqjJ5n:Y6ccXhQnPH4k5pejr
Malware Config
Extracted
formbook
gski
w4dqmeRbroucK1d6Rjoieflr
4aOmGT8hdudzUsv7ZSwieflr
3sTC4jMnhzX+pOJNTZ4=
JcH9cI2V8BEeA0eA
doY0NLSYANTXiHt9/fbsP706cA==
KhN1zCT4Nb5T//UnNQ==
y4/RV2RRqNEr0c4nzNWP
x8sfUpcmiXqxdfls0dSN
rlygM3RQmQ7DliRSBQUKpWJ/FuU=
s672RU9HtT3XWaTvdEidsoLRjZb5J5oE
uaT/Znv3O9WfXs8GBluj2Z2szeMP
QvElhI8JUPHBlRsjsodB5GmUzO0W
2uM5rt7BEpcswwJhDA8JnA8=
TDFfhORfvuRP//UnNQ==
MtPNDl4mh1dSxgZs0dSN
ejpoOLXE/Wa7zMwppl3JOt8faA==
8qPraI3lOFSrRmCSR4EnHQc=
+LOpAwtx0LfGnOJNTZ4=
wMQehpwddDxHII+rVCwieflr
8KPhZrjGG//aix1s0dSN
BsfyXJEZYAPIjgAvbJD/Kw==
hUsZO5Cf7TW7qBNs0dSN
8AVFhnVVn+Bi5gpsdtKa
PTxvvNhJl3V99uJNTZ4=
FNGt4DYFb1SMVsMHqJtl72WUzO0W
KNOt0/v1SVhv8uJNTZ4=
OwXyQlRLkKTklAlsdtKa
rKfyK4D9Pf7ToRVwQ5g=
3qHce9FhZnO9kgZs0dSN
E8YGjcm9CYBB4hIqbJD/Kw==
HOfPGBv2XfK7h/0qbJD/Kw==
OiCFFEDqFh1q
FsedwRag/OHy1TJLYNoDOt8faA==
vnxghcKh941LAX2YREAsL2J/FuU=
3ofaZaOZ7Wv/cr/k9YEnHQc=
Vkeq+/TvVqcuutP7ZCoieflr
qU8tZWj5TctWxPQbM5XN0t9FTRFMjQ==
MyCA6uk7gVBGLnCT
MO3eJ01NrPPxqjBS5blMV1CtnTxelA==
q3VwvBkvQd+ziO8ZTtYDOt8faA==
wInQTFwsRxXioOJNTZ4=
GbyLvKRz3nNIHJnR8IEnHQc=
9Ns8qqkBSgb5dqjj8IEnHQc=
g4Pldta5Fe7zZaDFdX5B5GmUzO0W
oKy07PRSo6Lfjfls0dSN
nEF99ADaK40Uz9cWMw==
/k25lD4H5LIH6mc=
tnG8Q4HtU4oUAYCZswpGe2CdHKIeFbY=
f01EnpxmfjPDOA==
Zg+Jrh7u7LIH6mc=
EL8Nf4xctT715S1cVJw=
JxyHDEjOM0eMJxEyPw==
NTGS3y+b9QgKBnWZ
Y1IFUY4aJT13
PDqeAfhXs5LMdpq1USsieflr
FAeGDEO5CfsOksoHSD8FPA==
dD1UPp0DZLxFB/QRLA==
qnC0NWpkfjPDOA==
0IeuAfNJmGZ3b7YtQJQ=
A78FfJOK4T/BJmKNgtD/Ot8faA==
M92p3zizGhwrkcH4nbrvA+QuTRFMjQ==
eF/CJzzFGbeKW5YMI4c=
9bP5gsxLl212Xtbv8IEnHQc=
rZsDg76qCb28nOJNTZ4=
mezaika.com
Signatures
-
Formbook family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2636 set thread context of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2840 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31 PID 2636 wrote to memory of 2840 2636 a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe"C:\Users\Admin\AppData\Local\Temp\a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\a0b19468a7896874e57b014b28e8d3abd1707e2b52a8ef1bf516d4c1a76a7b42.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-