Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe
Resource
win7-20240903-en
General
-
Target
6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe
-
Size
516KB
-
MD5
1a477f84e3566771415106234cf77f81
-
SHA1
2bbe52a661badffb060173e25822d411ae6203e7
-
SHA256
6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c
-
SHA512
76841c49d6eb39f725d1a8b7b35933b9c52a54b78382c53158fa3807da5092391da79cd1fb9e43c39297e21f87525881c7ab2b340362e87fff529f29f8e67f78
-
SSDEEP
12288:8xc93fzB9dNDHKPWxCLxT/ApeN5mTjvPd/SSdo81ys:f9PtwuxuxTokNwf9/z
Malware Config
Extracted
formbook
4.1
sn31
matsuomatsuo.com
104wn.com
bolacorner.com
dawonderer.com
yourpamlano.xyz
mtzmx.icu
lepakzaparket.com
barmagli.com
danta.ltd
marumaru240.com
people-centeredhr.com
test-brew-inc.com
clairvoyantbusinesscoach.com
aforeignexchangeblog.com
erentekbilisim.com
gangqinqu123.net
defiguaranteebonds.com
thegioigaubong97.site
vaoiwin.info
vcwholeness.com
03c3twpfee5estjovfu2655.com
mutantapeyachtclubtoken.store
pixelkev.xyz
corporacioncymaz.com
iampro-found.com
azureconsults.com
bam-bong.com
advanceresubeopene.biz
tzjisheng.com
krdz28.online
ycw2009.com
minioe.com
dronelink.xyz
autu.cfd
sdwmkj.com
uixray.xyz
informacion-numero-24-h.site
123dianyingyuan.com
tj-assets.com
usaservicedogregistratuon.com
metagwnics.com
pepeksquad2.host
kc7.club
yundtremark.com
finance-employers.com
euroglobalnews.info
estudioenzetti.com
rodosmail.xyz
bm65.xyz
bchmtn.net
server4uuss.net
maisonretraiteprivee.com
atelierelzaaidar.com
thegurlyboutique.com
primobellaquartz.com
jetskirentaldublin.com
akmeetech.com
withoutyoutube.com
blackcreekwatershed.com
89qp52.com
e3488.com
vote4menk.com
tyma.club
theceditpalooza.com
boxberry-my.com
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral1/memory/2532-9-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 2532 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30 PID 2012 wrote to memory of 2532 2012 6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe"C:\Users\Admin\AppData\Local\Temp\6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exeC:\Users\Admin\AppData\Local\Temp\6e9b59bb1b15031d5c758d3c3043c9fc853bc61c3f51a15eaeea1d06628c532c.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-