Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe
Resource
win7-20241010-en
General
-
Target
bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe
-
Size
2.3MB
-
MD5
4bdd353f176639321cfc03cd3499299e
-
SHA1
7cdf8b5cbc1e29dc73a2a22e37937faa304363b0
-
SHA256
bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed
-
SHA512
a81dd1ac02d357c7633d79e419a2471cfb8610a7bad151c1d67601ae42c94b60f54b61a0d7ef80a004c8008b4e781630157c393bc590ca3c6913326b16297f9a
-
SSDEEP
49152:+cHY/2gcQm44Wz0pEJ4BCFEFJeddZQr8FmFJJKJbgLlmspkMLfLjMIktZgg0glv6:H
Malware Config
Extracted
formbook
4.1
wnb
johntuckerrealty.com
hariee.com
9902990.com
popupweddingorlando.com
whyscream.online
millroadhouse.com
gnmal.com
yourcolostomy.com
romamalove.com
000345dy.com
idrbeats.com
romanusizuegbu.com
1telefonoatencion24horas.com
imgsaspainindustrie.com
elitedelux.com
surrilob.com
tilttownpinball.com
cyberdocked.com
tavtejarat.com
liveon4k.xyz
tribemapa.com
magnfee.com
cherryvendingmachine.com
danfrem.com
diplomus-markets.com
rjtvinstaller.online
studiowestelite.com
sparksanimalhealing.com
zubatravels.com
alexandriacuisine.com
nancyarctic.icu
my-home.cool
newgreenoriginal.com
nursewell-int.com
artionela.net
tecnopreneur.com
prismagadget.com
zwbupow.icu
2ndskreen.com
allamericaninventory.com
boshangkeji.com
demons-design.com
vrbcard.com
animationnights.media
stanthonyschooldhule.com
tengcez.com
comma-la.info
vbienwf.icu
greenrushhomebusiness.com
top-dispatchtowitnesstoday.info
sempatkering.com
cumluv.com
babiesshibainukennel.com
stock-improvement.com
behealthyky.com
seoultechpe.com
ruxianglouav.xyz
hxsshy.com
iskyrobot.com
trollingguide.com
gruposderock.com
frichickspk.com
chestervillehomevalues.com
flightsimscreenshots.com
takedaitos.com
Signatures
-
Formbook family
-
Formbook payload 3 IoCs
resource yara_rule behavioral1/files/0x000a000000012263-5.dat formbook behavioral1/memory/1960-20-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1960-17-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Executes dropped EXE 1 IoCs
pid Process 2888 3a231653-36ea-4737-8a66-80177e79563f.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1996 set thread context of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2904 1960 WerFault.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2836 timeout.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2888 3a231653-36ea-4737-8a66-80177e79563f.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2888 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 30 PID 1996 wrote to memory of 2888 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 30 PID 1996 wrote to memory of 2888 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 30 PID 1996 wrote to memory of 2888 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 30 PID 1996 wrote to memory of 2804 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 31 PID 1996 wrote to memory of 2804 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 31 PID 1996 wrote to memory of 2804 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 31 PID 1996 wrote to memory of 2804 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 31 PID 2804 wrote to memory of 2836 2804 cmd.exe 33 PID 2804 wrote to memory of 2836 2804 cmd.exe 33 PID 2804 wrote to memory of 2836 2804 cmd.exe 33 PID 2804 wrote to memory of 2836 2804 cmd.exe 33 PID 1996 wrote to memory of 3000 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 34 PID 1996 wrote to memory of 3000 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 34 PID 1996 wrote to memory of 3000 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 34 PID 1996 wrote to memory of 3000 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 34 PID 1996 wrote to memory of 2976 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 35 PID 1996 wrote to memory of 2976 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 35 PID 1996 wrote to memory of 2976 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 35 PID 1996 wrote to memory of 2976 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 35 PID 1996 wrote to memory of 2932 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 36 PID 1996 wrote to memory of 2932 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 36 PID 1996 wrote to memory of 2932 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 36 PID 1996 wrote to memory of 2932 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 36 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1996 wrote to memory of 1960 1996 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 37 PID 1960 wrote to memory of 2904 1960 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 38 PID 1960 wrote to memory of 2904 1960 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 38 PID 1960 wrote to memory of 2904 1960 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 38 PID 1960 wrote to memory of 2904 1960 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3a231653-36ea-4737-8a66-80177e79563f.exe"C:\Users\Admin\AppData\Local\Temp\3a231653-36ea-4737-8a66-80177e79563f.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"2⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"2⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"2⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 363⤵
- Program crash
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD57f76a7e305f5ae4cf5b6b89a3a51970d
SHA1a19d5d1d4ae0f14d96b577ca7a32e4c240b69d41
SHA2561d0065110f0eb382f09ae48487ce360145631dac95594b10fbea92a947c82a82
SHA512e22813dfa096582f57f8d49d3b2c1705495fced3efe104e8ad1118342d7f9d99f5d76f57fccd6f58e48be58824c7baa7dc7f4bb8506563314d212db7e165896f