Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe
Resource
win7-20241023-en
General
-
Target
eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe
-
Size
595KB
-
MD5
2f24e23110366756b11b46d2cccd7aeb
-
SHA1
6ad4e3016224725a991492d21c6811c0dad51fdd
-
SHA256
eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d
-
SHA512
1ced575e2b17883f68a2f3b1847a4540109f9d87bbed3d25c2deeabcc1f09550e952bf38eb652cee6939d1ddf0b30d070c9d3638f0713f660f895209f8bea903
-
SSDEEP
12288:0FIkLt1kuvZu0qNWe9mD+zT4u3DTFlebL0477oaXnz61QIb:03tDvYjWeM6Hx3fFle30gz
Malware Config
Extracted
formbook
4.1
m6tn
deborahtokarz.com
bearpawshoe.com
fukugyo111.com
chacie.com
amoresalonprescott.com
aiiecrs.xyz
betmoristv.com
metauniversalmentalhealth.com
miravalfarmspa.com
satyrwoodslifestyle.com
biomend.life
dolevelup.com
fengshidg.com
alshuhranews.com
nuomisummer.xyz
mankaucleaning.com
sierradelaculebrazamora.com
311ly.com
universetechco.com
duurzamepopcornbak.online
comzix.com
surgecaardinfo.com
mitikconstruction.com
seagurl-coin.com
quetzalmexicano.com
compliantfiletransfer.com
tartessos-selection.com
rmatokenicoksale.com
homeswithbw.com
ythdmupi.xyz
planetbethesda.com
kdo.xyz
madisoncurlingclubstreaming.com
hnerlase.xyz
momdreamland.com
wolfx.xyz
ambii.life
bettybelloc.xyz
fanxijia.com
investwithconfodence.com
sukamusic.com
dcombeauty.com
bembeyaz.net
genpaws.com
drhencks.com
ghamex.online
bakulrezeki.com
galaxy-edgemeta-verse.com
fyhiosoa.xyz
tcw7799com.com
saintjohnspncc.com
animal-kingdom-meta-verse.com
blockchainbotz.net
elotrolado.store
chitraputa.com
metaversehospitality.xyz
ebikesandscooters.net
staylxmed.com
bluecontabilidade.com
pacifictowergroup.com
disney-genie-plus-metaverse.com
wallboxjunkie.com
magicpast.com
safezoid.com
photodesign.info
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2940-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 2940 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2908 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 31 PID 2064 wrote to memory of 2908 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 31 PID 2064 wrote to memory of 2908 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 31 PID 2064 wrote to memory of 2908 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 31 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32 PID 2064 wrote to memory of 2940 2064 eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe"C:\Users\Admin\AppData\Local\Temp\eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe"C:\Users\Admin\AppData\Local\Temp\eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe"2⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe"C:\Users\Admin\AppData\Local\Temp\eac788bb8bcf8bc689550efc391941cc112c5bd92f227cc71c2ae6f42842ac2d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-