Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe
Resource
win7-20241010-en
General
-
Target
bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe
-
Size
2.3MB
-
MD5
4bdd353f176639321cfc03cd3499299e
-
SHA1
7cdf8b5cbc1e29dc73a2a22e37937faa304363b0
-
SHA256
bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed
-
SHA512
a81dd1ac02d357c7633d79e419a2471cfb8610a7bad151c1d67601ae42c94b60f54b61a0d7ef80a004c8008b4e781630157c393bc590ca3c6913326b16297f9a
-
SSDEEP
49152:+cHY/2gcQm44Wz0pEJ4BCFEFJeddZQr8FmFJJKJbgLlmspkMLfLjMIktZgg0glv6:H
Malware Config
Extracted
formbook
4.1
wnb
johntuckerrealty.com
hariee.com
9902990.com
popupweddingorlando.com
whyscream.online
millroadhouse.com
gnmal.com
yourcolostomy.com
romamalove.com
000345dy.com
idrbeats.com
romanusizuegbu.com
1telefonoatencion24horas.com
imgsaspainindustrie.com
elitedelux.com
surrilob.com
tilttownpinball.com
cyberdocked.com
tavtejarat.com
liveon4k.xyz
tribemapa.com
magnfee.com
cherryvendingmachine.com
danfrem.com
diplomus-markets.com
rjtvinstaller.online
studiowestelite.com
sparksanimalhealing.com
zubatravels.com
alexandriacuisine.com
nancyarctic.icu
my-home.cool
newgreenoriginal.com
nursewell-int.com
artionela.net
tecnopreneur.com
prismagadget.com
zwbupow.icu
2ndskreen.com
allamericaninventory.com
boshangkeji.com
demons-design.com
vrbcard.com
animationnights.media
stanthonyschooldhule.com
tengcez.com
comma-la.info
vbienwf.icu
greenrushhomebusiness.com
top-dispatchtowitnesstoday.info
sempatkering.com
cumluv.com
babiesshibainukennel.com
stock-improvement.com
behealthyky.com
seoultechpe.com
ruxianglouav.xyz
hxsshy.com
iskyrobot.com
trollingguide.com
gruposderock.com
frichickspk.com
chestervillehomevalues.com
flightsimscreenshots.com
takedaitos.com
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023c98-9.dat formbook behavioral2/memory/3764-15-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Executes dropped EXE 1 IoCs
pid Process 4244 9bde9863-bdf9-4058-b4a2-64cead61f574.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3092 set thread context of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4556 3092 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bde9863-bdf9-4058-b4a2-64cead61f574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4416 timeout.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4244 9bde9863-bdf9-4058-b4a2-64cead61f574.exe 4244 9bde9863-bdf9-4058-b4a2-64cead61f574.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3764 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 3764 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4244 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 83 PID 3092 wrote to memory of 4244 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 83 PID 3092 wrote to memory of 4244 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 83 PID 3092 wrote to memory of 3276 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 84 PID 3092 wrote to memory of 3276 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 84 PID 3092 wrote to memory of 3276 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 84 PID 3276 wrote to memory of 4416 3276 cmd.exe 86 PID 3276 wrote to memory of 4416 3276 cmd.exe 86 PID 3276 wrote to memory of 4416 3276 cmd.exe 86 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87 PID 3092 wrote to memory of 3764 3092 bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\9bde9863-bdf9-4058-b4a2-64cead61f574.exe"C:\Users\Admin\AppData\Local\Temp\9bde9863-bdf9-4058-b4a2-64cead61f574.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"C:\Users\Admin\AppData\Local\Temp\bae3b7f48d13f1237f0ae3ad690e3980efa81dd790398d4f54e582c1b6f863ed.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 13002⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3092 -ip 30921⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD57f76a7e305f5ae4cf5b6b89a3a51970d
SHA1a19d5d1d4ae0f14d96b577ca7a32e4c240b69d41
SHA2561d0065110f0eb382f09ae48487ce360145631dac95594b10fbea92a947c82a82
SHA512e22813dfa096582f57f8d49d3b2c1705495fced3efe104e8ad1118342d7f9d99f5d76f57fccd6f58e48be58824c7baa7dc7f4bb8506563314d212db7e165896f